End to end secure anonymous communication for secure directed diffusion in IoT

Jayasree Sengupta, S. Ruj, S. Bit
{"title":"End to end secure anonymous communication for secure directed diffusion in IoT","authors":"Jayasree Sengupta, S. Ruj, S. Bit","doi":"10.1145/3288599.3295577","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3288599.3295577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网中安全定向扩散的端到端安全匿名通信
物联网(IoT)范例集成了智能设备和传感器,以构建智能家居、医疗保健等系统。然而,传感器容易受到来自恶意内部人员和外部人员的几种攻击。因此,为了保护基于物联网的应用程序,提供匿名通信和端到端数据保密,同时防止冒充和保护节点的隐私是重要的问题。现有的实现匿名通信或数据保密的解决方案,要么无法实现完全匿名,要么存储或通信开销大,难以在资源受限的传感器物联网中实现。因此,在这项工作中,我们提出了一种改进的安全定向扩散(ISDD)协议,针对所有上述安全目标的低开销解决方案。ISDD使用假名来隐藏节点的真实身份,从而保证匿名通信。它还使用双线性配对来派生共享密钥,然后使用共享密钥在明文消息上生成多个加密层。因此,ISDD实现了端到端的数据保密和节点的隐私性,并有效地防止恶意攻击者冒充合法节点。最后,通过安全性分析,我们建立了上述权利要求,同时实现了与其他最先进的竞争方案相比的附加功能。我们还计算了不同的开销,并与两种现有方案进行了比较。结果表明,与两种竞争方案相比,ISDD在通信和存储开销方面有了显著的改善,其代价是计算量的边际增加,同时能耗保持在可接受的范围内。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improving efficacy of concurrent internal binary search trees using local recovery An accurate missing data prediction method using LSTM based deep learning for health care A simple and practical concurrent non-blocking unbounded graph with linearizable reachability queries EnTER: an encounter based trowbox deployment strategy for enhancing network reliability in post-disaster scenarios over DTN Exploration and impact of blockchain-enabled adaptive non-binary trust models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1