{"title":"物联网中安全定向扩散的端到端安全匿名通信","authors":"Jayasree Sengupta, S. Ruj, S. Bit","doi":"10.1145/3288599.3295577","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"End to end secure anonymous communication for secure directed diffusion in IoT\",\"authors\":\"Jayasree Sengupta, S. Ruj, S. Bit\",\"doi\":\"10.1145/3288599.3295577\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.\",\"PeriodicalId\":346177,\"journal\":{\"name\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3288599.3295577\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3288599.3295577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
End to end secure anonymous communication for secure directed diffusion in IoT
The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.