Reliable and secure data transfer in IoT networks

With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2020-11, Vol.26 (8), p.5689-5702
Hauptverfasser: Gochhayat, Sarada Prasad, Lal, Chhagan, Sharma, Lokesh, Sharma, D. P., Gupta, Deepak, Saucedo, Jose Antonio Marmolejo, Kose, Utku
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5702
container_issue 8
container_start_page 5689
container_title Wireless networks
container_volume 26
creator Gochhayat, Sarada Prasad
Lal, Chhagan
Sharma, Lokesh
Sharma, D. P.
Gupta, Deepak
Saucedo, Jose Antonio Marmolejo
Kose, Utku
description With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.
doi_str_mv 10.1007/s11276-019-02036-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2239960194</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2239960194</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-f52f3418ff4926a3be9f45d794f8a8b54d61ace838ce3554b6d3fc0bc5de641e3</originalsourceid><addsrcrecordid>eNp9kM1LAzEQxYMoWKv_gKeA5-jkc5OjFL-gIEg9h2x2Iq11tyZbxP_e6ArePM07_N6bmUfIOYdLDtBcFc5FYxhwx0CArOqAzLhuBLPcmcOqQQgGIO0xOSllAwBWOjcj_Am369BukYa-owXjPiPtwhjomENfEma67unDsKI9jh9Dfi2n5CiFbcGz3zknz7c3q8U9Wz7ePSyulyxK7kaWtEhScZuScsIE2aJLSneNU8kG22rVGR4iWmkjSq1VazqZIrRRd2gURzknF1PuLg_veyyj3wz73NeVXoh6u6nPqkqJiYp5KCVj8ru8fgv503Pw39X4qRpfaf9TjYdqkpOpVLh_wfwX_Y_rC0USZYA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2239960194</pqid></control><display><type>article</type><title>Reliable and secure data transfer in IoT networks</title><source>SpringerLink Journals - AutoHoldings</source><creator>Gochhayat, Sarada Prasad ; Lal, Chhagan ; Sharma, Lokesh ; Sharma, D. P. ; Gupta, Deepak ; Saucedo, Jose Antonio Marmolejo ; Kose, Utku</creator><creatorcontrib>Gochhayat, Sarada Prasad ; Lal, Chhagan ; Sharma, Lokesh ; Sharma, D. P. ; Gupta, Deepak ; Saucedo, Jose Antonio Marmolejo ; Kose, Utku</creatorcontrib><description>With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-019-02036-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Agents (artificial intelligence) ; Authentication ; Communications Engineering ; Computer Communication Networks ; Cryptography ; Data exchange ; Data transfer (computers) ; Electrical Engineering ; Electronic devices ; Engineering ; Information transfer ; Internet of Things ; IT in Business ; Management ; Networks ; Security management ; Smart buildings ; Wireless networks</subject><ispartof>Wireless networks, 2020-11, Vol.26 (8), p.5689-5702</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-f52f3418ff4926a3be9f45d794f8a8b54d61ace838ce3554b6d3fc0bc5de641e3</citedby><cites>FETCH-LOGICAL-c319t-f52f3418ff4926a3be9f45d794f8a8b54d61ace838ce3554b6d3fc0bc5de641e3</cites><orcidid>0000-0002-9652-6415</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-019-02036-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-019-02036-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Gochhayat, Sarada Prasad</creatorcontrib><creatorcontrib>Lal, Chhagan</creatorcontrib><creatorcontrib>Sharma, Lokesh</creatorcontrib><creatorcontrib>Sharma, D. P.</creatorcontrib><creatorcontrib>Gupta, Deepak</creatorcontrib><creatorcontrib>Saucedo, Jose Antonio Marmolejo</creatorcontrib><creatorcontrib>Kose, Utku</creatorcontrib><title>Reliable and secure data transfer in IoT networks</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.</description><subject>Agents (artificial intelligence)</subject><subject>Authentication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cryptography</subject><subject>Data exchange</subject><subject>Data transfer (computers)</subject><subject>Electrical Engineering</subject><subject>Electronic devices</subject><subject>Engineering</subject><subject>Information transfer</subject><subject>Internet of Things</subject><subject>IT in Business</subject><subject>Management</subject><subject>Networks</subject><subject>Security management</subject><subject>Smart buildings</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM1LAzEQxYMoWKv_gKeA5-jkc5OjFL-gIEg9h2x2Iq11tyZbxP_e6ArePM07_N6bmUfIOYdLDtBcFc5FYxhwx0CArOqAzLhuBLPcmcOqQQgGIO0xOSllAwBWOjcj_Am369BukYa-owXjPiPtwhjomENfEma67unDsKI9jh9Dfi2n5CiFbcGz3zknz7c3q8U9Wz7ePSyulyxK7kaWtEhScZuScsIE2aJLSneNU8kG22rVGR4iWmkjSq1VazqZIrRRd2gURzknF1PuLg_veyyj3wz73NeVXoh6u6nPqkqJiYp5KCVj8ru8fgv503Pw39X4qRpfaf9TjYdqkpOpVLh_wfwX_Y_rC0USZYA</recordid><startdate>20201101</startdate><enddate>20201101</enddate><creator>Gochhayat, Sarada Prasad</creator><creator>Lal, Chhagan</creator><creator>Sharma, Lokesh</creator><creator>Sharma, D. P.</creator><creator>Gupta, Deepak</creator><creator>Saucedo, Jose Antonio Marmolejo</creator><creator>Kose, Utku</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-9652-6415</orcidid></search><sort><creationdate>20201101</creationdate><title>Reliable and secure data transfer in IoT networks</title><author>Gochhayat, Sarada Prasad ; Lal, Chhagan ; Sharma, Lokesh ; Sharma, D. P. ; Gupta, Deepak ; Saucedo, Jose Antonio Marmolejo ; Kose, Utku</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-f52f3418ff4926a3be9f45d794f8a8b54d61ace838ce3554b6d3fc0bc5de641e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Agents (artificial intelligence)</topic><topic>Authentication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cryptography</topic><topic>Data exchange</topic><topic>Data transfer (computers)</topic><topic>Electrical Engineering</topic><topic>Electronic devices</topic><topic>Engineering</topic><topic>Information transfer</topic><topic>Internet of Things</topic><topic>IT in Business</topic><topic>Management</topic><topic>Networks</topic><topic>Security management</topic><topic>Smart buildings</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gochhayat, Sarada Prasad</creatorcontrib><creatorcontrib>Lal, Chhagan</creatorcontrib><creatorcontrib>Sharma, Lokesh</creatorcontrib><creatorcontrib>Sharma, D. P.</creatorcontrib><creatorcontrib>Gupta, Deepak</creatorcontrib><creatorcontrib>Saucedo, Jose Antonio Marmolejo</creatorcontrib><creatorcontrib>Kose, Utku</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gochhayat, Sarada Prasad</au><au>Lal, Chhagan</au><au>Sharma, Lokesh</au><au>Sharma, D. P.</au><au>Gupta, Deepak</au><au>Saucedo, Jose Antonio Marmolejo</au><au>Kose, Utku</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reliable and secure data transfer in IoT networks</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2020-11-01</date><risdate>2020</risdate><volume>26</volume><issue>8</issue><spage>5689</spage><epage>5702</epage><pages>5689-5702</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-019-02036-0</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-9652-6415</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2020-11, Vol.26 (8), p.5689-5702
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_2239960194
source SpringerLink Journals - AutoHoldings
subjects Agents (artificial intelligence)
Authentication
Communications Engineering
Computer Communication Networks
Cryptography
Data exchange
Data transfer (computers)
Electrical Engineering
Electronic devices
Engineering
Information transfer
Internet of Things
IT in Business
Management
Networks
Security management
Smart buildings
Wireless networks
title Reliable and secure data transfer in IoT networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T10%3A21%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reliable%20and%20secure%20data%20transfer%20in%20IoT%20networks&rft.jtitle=Wireless%20networks&rft.au=Gochhayat,%20Sarada%20Prasad&rft.date=2020-11-01&rft.volume=26&rft.issue=8&rft.spage=5689&rft.epage=5702&rft.pages=5689-5702&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-019-02036-0&rft_dat=%3Cproquest_cross%3E2239960194%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2239960194&rft_id=info:pmid/&rfr_iscdi=true