Abstract

The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional Internet security architecture and protocols require huge resources and lack of end-to-end security mechanism. In this research, a resource efficient end-to-end security scheme has been proposed by offloading computations and storage of security parameters to fog nodes in the vicinity. In addition, a symmetric-key payload encryption has been used to minimize the overhead of message communication in the resource-contested IoT environment. The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes. The proposed end-to-end security scheme saves more communication bandwidth and incurs less overhead as compared to existing TLS-based security schemes. In particular, the proposed system uses less number of handshakes and achieves a decrease in the number of transmitted messages (approximately 184 bytes as compared to compared TSL message size of 332 bytes) for every handshake. Further, it has been demonstrated through experiments that the proposed security method incurs less overheads as compared to the TLS bandwidth consumption considering a single connection session during message subscription.

Highlights

  • The Internet of Things (IoT) cannot adopt standard Internet architecture and protocol standards mainly due to scalability issues and the limited resources

  • Traditional security protocols, if implemented, require expensive computation of asymmetric cryptography and Public Key Infrastructure certificates before authentication occurs in publish-subscribe IoT arenas [32]

  • We propose end-to-end security scheme for IoT devices considering publish-subscribe communication paradigm

Read more

Summary

Introduction

The Internet of Things (IoT) cannot adopt standard Internet architecture and protocol standards mainly due to scalability issues and the limited resources. A novel architecture and lightweight security protocol has to be adopted to minimize communication, computation and storage overheads in the IoT network. Traditional security protocols, if implemented, require expensive computation of asymmetric cryptography and Public Key Infrastructure certificates before authentication occurs in publish-subscribe IoT arenas [32].

Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.