A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment
TLDR
This paper proposes a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions and semantically model such protocol and analyze the security properties.Abstract:
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing data transmission among IoT devices is therefore a critical capability of IoT environments such as Intelligent Connected Vehicles, Smart Home, Intelligent City and so forth. However, cryptographic communication scheme is challenged by the limited resource of low-cost IoT devices, even negligible extra CPU usage of battery-powered sensors would result in dramatical decrease of the battery life. In this paper, to minimize the resource consumption, we propose a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions. Symmetric keys generated in this protocol are delegated based on a chaotic system, i.e., Logistic Map, to resist against the key reset and device capture attacks. We semantically model such protocol and analyze the security properties. Moreover, the resource consumption is also evaluated to guarantee runtime efficacy.read more
Citations
More filters
Journal ArticleDOI
Blockchain for smart cities: A review of architectures, integration trends and future research directions
Bharat Bhushan,Aditya Khamparia,K. Martin Sagayam,Sudhir Kumar Sharma,Mohd Abdul Ahad,Narayan C. Debnath +5 more
TL;DR: This paper presents the state-of-the-art blockchain technology to solve the security issues of smart cities and surveys the utility of blockchain in various smart communities such as healthcare, transportation, smart grid, supply chain management, financial systems and data center networks.
Journal ArticleDOI
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
TL;DR: This paper presents a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aims to shape a coherent picture of the current state-of-the-art efforts in this direction.
Journal ArticleDOI
Leveraging blockchain for ensuring trust in IoT: A survey
Rajesh Kumar,Rewa Sharma +1 more
TL;DR: The significance of integrating Blockchain technology in the IoT environment to ensure trust among IoT devices is illustrated and a comparative analysis between traditional and Blockchain-based trust management techniques is presented to represent the significance of Blockchain in ensuring trust.
Journal ArticleDOI
Leveraging blockchain for ensuring trust in IoT: A survey
TL;DR: In this paper , the authors present a comparative analysis between traditional and blockchain-based trust management techniques as proof of work to represent the significance of blockchain in ensuring trust among IoT devices.
Journal ArticleDOI
An overview of privacy preserving schemes for industrial Internet of Things
TL;DR: This article summarizes privacy issues in a cloud- or an edge-based industrial IoT system, which includes data privacy, location privacy, query and identity privacy, and also reviews privacy solutions when applying software defined network and blockchain under the above two systems.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI
A key-management scheme for distributed sensor networks
TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Book
The Design of Rijndael: AES - The Advanced Encryption Standard
Joan Daemen,Vincent Rijmen +1 more
TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Proceedings ArticleDOI
Random key predistribution schemes for sensor networks
TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Related Papers (5)
Analysis of Lightweight Cryptographic Solutions for Internet of Things
Isha,Ashish Kr. Luhach +1 more