Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks

Abstract Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system based on a generic IoT edge network in which nodes exchange messages through the Message Queue Telemetry Transport (MQTT) protocol. This work aims to increase MQTT security by mitigating data tampering, eavesdropping and Replay attacks by using the Elliptic Curve Cryptography (ECC), timestamps and wake up patterns, with the purpose of preserving node energy. The evaluated results will show that it is possible to increase the system lifetime by linking security levels and energy.

[1]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[2]  Leckraj Nagowah,et al.  A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).

[3]  P Parhana,et al.  Review on Internet of Things: Recent Applications and its Challenges , 2017 .

[4]  Katinka Wolter,et al.  A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks , 2018, Pervasive Mob. Comput..

[5]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[6]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[7]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[8]  Namje Park,et al.  Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.

[9]  Chien-Ming Chen,et al.  A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..

[10]  A Vanathi Cloning Attack Authenticator in Wireless Sensor Networks , 2012 .

[11]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[12]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[13]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[14]  Abdelouahed Zakari,et al.  New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).

[15]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[16]  Ching-Hsien Hsu,et al.  Case of ARM emulation optimization for offloading mechanisms in Mobile Cloud Computing , 2017, Future Gener. Comput. Syst..

[17]  Floriano De Rango,et al.  Performance evaluation of secure AODV with trust management under an energy aware perspective , 2014, International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014).

[18]  Yasir Saleem,et al.  Resource Management in Mobile Sink Based Wireless Sensor Networks through Cloud Computing , 2014 .

[19]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[20]  Ioannis Chatzigiannakis,et al.  A privacy-preserving smart parking system using an IoT elliptic curve based security platform , 2016, Comput. Commun..

[21]  Feng Xia,et al.  Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..

[22]  Marco Conti,et al.  Energy efficient distributed analytics at the edge of the network for IoT environments , 2018, Pervasive Mob. Comput..

[23]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .

[24]  P. Balamuralidhar,et al.  Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[25]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[26]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[27]  Mubashir Husain Rehmani,et al.  Mobile Edge Computing: Opportunities, solutions, and challenges , 2017, Future Gener. Comput. Syst..

[28]  Jayabhaskar Muthukuru,et al.  Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things , 2016 .

[29]  Ahmed Serhrouchni,et al.  A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).