scispace - formally typeset
Open AccessJournal ArticleDOI

A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment

TLDR
This paper proposes a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions and semantically model such protocol and analyze the security properties.
Abstract
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing data transmission among IoT devices is therefore a critical capability of IoT environments such as Intelligent Connected Vehicles, Smart Home, Intelligent City and so forth. However, cryptographic communication scheme is challenged by the limited resource of low-cost IoT devices, even negligible extra CPU usage of battery-powered sensors would result in dramatical decrease of the battery life. In this paper, to minimize the resource consumption, we propose a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions. Symmetric keys generated in this protocol are delegated based on a chaotic system, i.e., Logistic Map, to resist against the key reset and device capture attacks. We semantically model such protocol and analyze the security properties. Moreover, the resource consumption is also evaluated to guarantee runtime efficacy.

read more

Citations
More filters
Journal ArticleDOI

Blockchain for smart cities: A review of architectures, integration trends and future research directions

TL;DR: This paper presents the state-of-the-art blockchain technology to solve the security issues of smart cities and surveys the utility of blockchain in various smart communities such as healthcare, transportation, smart grid, supply chain management, financial systems and data center networks.
Journal ArticleDOI

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

TL;DR: This paper presents a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aims to shape a coherent picture of the current state-of-the-art efforts in this direction.
Journal ArticleDOI

Leveraging blockchain for ensuring trust in IoT: A survey

TL;DR: The significance of integrating Blockchain technology in the IoT environment to ensure trust among IoT devices is illustrated and a comparative analysis between traditional and Blockchain-based trust management techniques is presented to represent the significance of Blockchain in ensuring trust.
Journal ArticleDOI

Leveraging blockchain for ensuring trust in IoT: A survey

TL;DR: In this paper , the authors present a comparative analysis between traditional and blockchain-based trust management techniques as proof of work to represent the significance of blockchain in ensuring trust among IoT devices.
Journal ArticleDOI

An overview of privacy preserving schemes for industrial Internet of Things

TL;DR: This article summarizes privacy issues in a cloud- or an edge-based industrial IoT system, which includes data privacy, location privacy, query and identity privacy, and also reviews privacy solutions when applying software defined network and blockchain under the above two systems.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Related Papers (5)