On Cryptographic Approaches to Internet-Of-Things Security

نویسنده

  • S. Zhou
چکیده

Internet Of Things is an evolution and superset of current internet of networks of computers. We are already on the way of connecting every Thing to internet, mobile internet focusing on 3G phones is a good pioneer example. Our focuses are turning from devices with high capability of computing and storage to those with constrained resources (CPU, memory, energy), from reliable transportations to lossy networks, from comfortable indoor install environments to all kinds of outdoor environments, from rather static user behaviors to variant user behaviors[1]. Given complicated IP protocols (e.g. IPv6 with many extensions and numerous options[3] , IPSEC with so many RFCs[4]) and all kinds of specialized sensor networks, e.g. Zigbee, the work is to adapt and converge them together. So many mismatches, e.g. capability mismatch between different devices, mismatch between communications and processing bandwidth[2], need to patch. Another important mismatch is from difference between the malicious environment of IOT and the current experience derived from internet. Most of the security issues in IOT [5,6,7] are familiar, because they also exist in current internet. For example, eavesdropping, false routing, message tampering, unauthorized usage, DOS attack. we are not unprepared in this field. A difference is that the specific attacks leading to the issues may be quite different. For example, DOS attacks can be achieved by sending signals to keep nodes from slumber[7]. Some issues may be major concerns in IOT but not in current internet. For example, because devices are easy to access physically or wirelessly in IOT, then physical destruction, secret extraction. tampering of nodes are more serious[7]. Therefore, resolutions to deal with the issues are required to have some extra characteristics, e.g., resilience in case nodes are compromised[7], and lightweight cryptographic technologies are preferred[14]. It is easy to misunderstand " lightweight " as less secure. Although devices to be protected are constrained in resources, but attackers are not. So we need security techniques and mechanisms that are lightweight in resource consuming, but NOT in security weight. As reported in [14], in lightweight cryptography, we have secure symmetric cryptography: AES,CLEFIA and PRESENT, stream ciphers: Grain v1, MICKEY v2, and Trivium. But we don't have good candidate in Hash function[14,15], maybe. As for asymmetric cryptography, ECC[13], XTR[17], IBC[11,12] are available candidates. We also need security architectures, e.g., key management scheme including key provisioning, key updating, key revocation etc. In category of asymmetric keys, PKI is a mature scheme, and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

Research on Lightweight Information Security System of the Internet of Things

In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012