scispace - formally typeset
Proceedings ArticleDOI

Secure communication and firewall architecture for IoT applications

TLDR
A novel secure communication and firewall architecture suitable for IoT applications is proposed, based on the idea of off-loading computational load from IoT devices by introducing a server entity in the network, which is compared with the state of the art DTLS protocol defined by the IETF.
Abstract
Internet of Things (IoT) enables global connectivity to remote smart devices. This technology involves sensing, communication, and processing of real time data received from billions of connected devices with minimal human intervention. The exposure to the Internet and constraints in IoT devices, typically limited memory, low processing ability, and mostly battery based operations make them vulnerable to various attacks. These attacks include but are not limited to Denial of Service (DOS), Man-in-Middle(MIM), Sybil and flooding attacks. Security becomes vital in IoT applications as they are expected to interact with the physical world, especially in safety critical applications like health, defense, automobiles etc. The traditional security model for Internet applications is not suitable for IoT, as it is mostly non-realtime and non-safety critical. Further, end-nodes are not considered to be energy-constrained devices in this model. Therefore, it is important to have alternative solutions that provide meaningful security to IoT devices/applications. In this paper we propose a novel secure communication and firewall architecture suitable for IoT applications. It is based on the idea of off-loading computational load from IoT devices by introducing a server entity in the network. Further, we also discuss design of protocol, entity states and other implementation details. In the end, we compare our solution with the state of the art DTLS protocol (RFC 6347) defined by the IETF.

read more

Citations
More filters
Journal ArticleDOI

A survey on internet of things security: Requirements, challenges, and solutions

TL;DR: A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.
Journal ArticleDOI

Reliable and secure data transfer in IoT networks

TL;DR: The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity that coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices.
Journal ArticleDOI

DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT

TL;DR: A simplified handshake protocol of DTLS (DTLShps) is proposed to reduce the computational overhead of the IoT devices for a general scenario of end-to-end communications based on software-defined networking (SDN).
Journal ArticleDOI

Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme

TL;DR: A deep insight to the secrecy capacity of wireless sensor network and a calculable threshold of capacity based on the amplify-and-forward (AF) compressed sensing scheme and a feasible algorithm based on augmented Lagrange method for source reconstruction for the legitimate nodes and un-authorized nodes are offered.
Proceedings ArticleDOI

ARP Poisoning Prevention in Internet of Things

TL;DR: The method intercepts the attacker’s information and blocks the ARP attack successfully to a certain extent, which mainly involves binding the IP address of the single-chip microcomputer to MAC address of Ubuntu in the router's static ARP cache table.
References
More filters

The Transport Layer Security (TLS) Protocol Version 1.2

Eric Rescorla
TL;DR: This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

Internet X.509 Public Key Infrastructure Certificate and CRL Profile

TL;DR: In this article, the X.509 v3 certificate is described in detail, with additional information regarding the format and semantics of Internet name forms (e.g., IP addresses).
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.

Datagram Transport Layer Security Version 1.2

TL;DR: This document updates DTLS 1.0 to work with TLS version 1.2 of the Datagram Transport Layer Security (DTLS) protocol, which provides communications privacy for datagram protocols.
Proceedings ArticleDOI

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things

TL;DR: This paper presents a detailed analysis of IoT attack surfaces, threat models, security issues, requirements, forensics, and challenges, and provides a set of open problems in IoT security and privacy to guide the attention of researchers into solving the most critical problems.
Related Papers (5)