Security Level versus Energy Consumption in Wireless Protocols for Internet of Things

Author(s):  
Algimantas Venčkauskas ◽  
Nerijus Jusas ◽  
Jevgenijus Toldinas ◽  
Egidijus Kazanavičius
2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


Author(s):  
Lihua Song ◽  
Xinran Ju ◽  
Zongke Zhu ◽  
Mengchen Li

AbstractInformation security has become a hot topic in Internet of Things (IoT), and traditional centralized access control models are faced with threats such as single point failure, internal attack, and central leak. In this paper, we propose a model to improve the access control security of the IoT, which is based on zero-knowledge proof and smart contract technology in the blockchain. Firstly, we deploy attribute information of access control in the blockchain, which relieves the pressure and credibility problem brought by the third-party information concentration. Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem. Besides, the use of smart contracts solves the problem of low computing efficiency of IoT devices and the waste of blockchain computing power resources. Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented. The test analysis results show that the model achieves effective attribute privacy protection, compared with the Attribute-Based Access Control model of the same security level, the access efficiency increases linearly with the increase of access scale.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1627
Author(s):  
Giovanni Battista Gaggero ◽  
Mario Marchese ◽  
Aya Moheddine ◽  
Fabio Patrone

The way of generating and distributing energy throughout the electrical grid to all users is evolving. The concept of Smart Grid (SG) took place to enhance the management of the electrical grid infrastructure and its functionalities from the traditional system to an improved one. To measure the energy consumption of the users is one of these functionalities that, in some countries, has already evolved from a periodical manual consumption reading to a more frequent and automatic one, leading to the concept of Smart Metering (SM). Technology improvement could be applied to the SM systems to allow, on one hand, a more efficient way to collect the energy consumption data of each user, and, on the other hand, a better distribution of the available energy through the infrastructure. Widespread communication solutions based on existing telecommunication infrastructures instead of using ad-hoc ones can be exploited for this purpose. In this paper, we recall the basic elements and the evolution of the SM network architecture focusing on how it could further improve in the near future. We report the main technologies and protocols which can be exploited for the data exchange throughout the infrastructure and the pros and cons of each solution. Finally, we propose an innovative solution as a possible evolution of the SM system. This solution is based on a set of Internet of Things (IoT) communication technologies called Low Power Wide Area Network (LPWAN) which could be employed to improve the performance of the currently used technologies and provide additional functionalities. We also propose the employment of Unmanned Aerial Vehicles (UAVs) to periodically collect energy consumption data, with evident advantages especially if employed in rural and remote areas. We show some preliminary performance results which allow assessing the feasibility of the proposed approach.


2020 ◽  
Vol 7 (1) ◽  
pp. 528-543
Author(s):  
Jacob Abegunde ◽  
Hannan Xiao ◽  
Joseph Spring

2022 ◽  
Vol 25 (3) ◽  
pp. 28-33
Author(s):  
Francesco Restuccia ◽  
Tommaso Melodia

Wireless systems such as the Internet of Things (IoT) are changing the way we interact with the cyber and the physical world. As IoT systems become more and more pervasive, it is imperative to design wireless protocols that can effectively and efficiently support IoT devices and operations. On the other hand, today's IoT wireless systems are based on inflexible designs, which makes them inefficient and prone to a variety of wireless attacks. In this paper, we introduce the new notion of a deep learning-based polymorphic IoT receiver, able to reconfigure its waveform demodulation strategy itself in real time, based on the inferred waveform parameters. Our key innovation is the introduction of a novel embedded deep learning architecture that enables the solution of waveform inference problems, which is then integrated into a generalized hardware/software architecture with radio components and signal processing. Our polymorphic wireless receiver is prototyped on a custom-made software-defined radio platform. We show through extensive over-the-air experiments that the system achieves throughput within 87% of a perfect-knowledge Oracle system, thus demonstrating for the first time that polymorphic receivers are feasible.


Author(s):  
K. S. Nirmala Bai

The significant way of using the technology relies on the effective way of utilizing and regenerating the resources. Technology advancements increase day by day in each and every sector including construction, automobile, manufacture, production, bio-medical sciences and home appliances. The use of wireless protocols that bridges the gap with the Security and Privacy Issues in Internet of Things has been drastically in demand as always. Ipv6, IEEE 802.15.4, WirelessHart had played a vital role in the field of Internet of Things. Their impact can be further advanced with the specifications designed in Wireless Protocols. Robust and more secure bits preserving communication protocol leading the earlier protocols used.


Sign in / Sign up

Export Citation Format

Share Document