Abstract

Lately, the Internet of Things (IoT) has opened up new opportunities to business and enterprises; however, the cost of providing security and privacy best practices is preventing numerous organizations from adopting this innovation. With the proliferation of connecting devices in IoT, significant increases have been recorded in energy use, harmful contamination and e-waste. A new paradigm of green IoT is aimed at designing environmentally friendly protocols by reducing the carbon impact and promote efficient techniques for energy use. There is a consistent effort of designing distinctive security structures to address vulnerabilities and attacks. However, most of the existing schemes are not energy efficient. To bridge the gap, we propose the hybrid logical security framework (HLSF), which offers authentication and data confidentiality in IoT. HLSF uses a lightweight cryptographic mechanism for unique authentication. It enhances the level of security and provides better network functionalities using energy-efficient schemes. With extensive simulation, we compare HLSF with two existing popular security schemes, namely, constrained application protocol (CoAP) and object security architecture for IoT (OSCAR). The result shows that HLSF outperforms CoAP and OSCAR in terms of throughput with low computational, storage and energy overhead, even in the presence of attackers.

Highlights

  • The Internet of Things (IoT) leads to a revolutionary change in the lifestyle of users [1]

  • Mutual authentication is performed among Coordinating Unit (CU) and IS using multiple parameters, such as a secret key, a random variable, and an SN that is generated in the registration phase

  • It becomes very essential that more research must take into consideration green IoT to preserve our environment and to make society more astute and greener

Read more

Summary

Introduction

The Internet of Things (IoT) leads to a revolutionary change in the lifestyle of users [1]. Every device that is connected to the IoT works in a smart way to make the world technology-dependent [2]. Users expect a high level of security and privacy from the IoT, requiring a security framework [4]. The inbuilt security solutions in the IoT are susceptible to attacks, such as denial of service (DoS), spoofing, and many more [5]. A security framework is evaluated by assessing its security features, such as authentication, or confidentiality in this case [6,7]. The last evaluation measure for a security. Special attention should be paid to limit the use of their resources, as well as to offffer security at the same time. LLiigghhttwweeiight ccrryyppttoography solutions offffer both security as well as performance. The enabling technologies for green IoT are called information and communication technology (ICT) technologies [12]

Motivation
Contributions
Organization
Related Work
Simulation Tool and Simulation Parameters
Memory Requirements
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call