Proceedings ArticleDOI
Secure communication and firewall architecture for IoT applications
Navinkumar Maheshwari,Haresh Dagale +1 more
- pp 328-335
TLDR
A novel secure communication and firewall architecture suitable for IoT applications is proposed, based on the idea of off-loading computational load from IoT devices by introducing a server entity in the network, which is compared with the state of the art DTLS protocol defined by the IETF.Abstract:
Internet of Things (IoT) enables global connectivity to remote smart devices. This technology involves sensing, communication, and processing of real time data received from billions of connected devices with minimal human intervention. The exposure to the Internet and constraints in IoT devices, typically limited memory, low processing ability, and mostly battery based operations make them vulnerable to various attacks. These attacks include but are not limited to Denial of Service (DOS), Man-in-Middle(MIM), Sybil and flooding attacks. Security becomes vital in IoT applications as they are expected to interact with the physical world, especially in safety critical applications like health, defense, automobiles etc. The traditional security model for Internet applications is not suitable for IoT, as it is mostly non-realtime and non-safety critical. Further, end-nodes are not considered to be energy-constrained devices in this model. Therefore, it is important to have alternative solutions that provide meaningful security to IoT devices/applications. In this paper we propose a novel secure communication and firewall architecture suitable for IoT applications. It is based on the idea of off-loading computational load from IoT devices by introducing a server entity in the network. Further, we also discuss design of protocol, entity states and other implementation details. In the end, we compare our solution with the state of the art DTLS protocol (RFC 6347) defined by the IETF.read more
Citations
More filters
Journal ArticleDOI
A survey on internet of things security: Requirements, challenges, and solutions
TL;DR: A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.
Journal ArticleDOI
Reliable and secure data transfer in IoT networks
Sarada Prasad Gochhayat,Chhagan Lal,Lokesh Sharma,Devi Prasad Sharma,Deepak Gupta,Jose Antonio Marmolejo Saucedo,Utku Kose +6 more
TL;DR: The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity that coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices.
Journal ArticleDOI
DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT
TL;DR: A simplified handshake protocol of DTLS (DTLShps) is proposed to reduce the computational overhead of the IoT devices for a general scenario of end-to-end communications based on software-defined networking (SDN).
Journal ArticleDOI
Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme
Guo Jianlan,Yu-Qiang Chen,Yang Huaide,Chien-Ming Chen,Yeh-Cheng Chen,Huiyu Zhang,Zhiyu Zhang +6 more
TL;DR: A deep insight to the secrecy capacity of wireless sensor network and a calculable threshold of capacity based on the amplify-and-forward (AF) compressed sensing scheme and a feasible algorithm based on augmented Lagrange method for source reconstruction for the legitimate nodes and un-authorized nodes are offered.
Proceedings ArticleDOI
ARP Poisoning Prevention in Internet of Things
TL;DR: The method intercepts the attacker’s information and blocks the ARP attack successfully to a certain extent, which mainly involves binding the IP address of the single-chip microcomputer to MAC address of Ubuntu in the router's static ARP cache table.
References
More filters
The Transport Layer Security (TLS) Protocol Version 1.2
TL;DR: This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
Internet X.509 Public Key Infrastructure Certificate and CRL Profile
TL;DR: In this article, the X.509 v3 certificate is described in detail, with additional information regarding the format and semantics of Internet name forms (e.g., IP addresses).
Journal ArticleDOI
A Survey on Security and Privacy Issues in Internet-of-Things
TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Datagram Transport Layer Security Version 1.2
Eric Rescorla,Nagendra Modadugu +1 more
TL;DR: This document updates DTLS 1.0 to work with TLS version 1.2 of the Datagram Transport Layer Security (DTLS) protocol, which provides communications privacy for datagram protocols.
Proceedings ArticleDOI
Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things
TL;DR: This paper presents a detailed analysis of IoT attack surfaces, threat models, security issues, requirements, forensics, and challenges, and provides a set of open problems in IoT security and privacy to guide the attention of researchers into solving the most critical problems.