An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement

Author(s):  
Wen-Chung Tsai ◽  
Tzu-Hsuan Tsai ◽  
Guang-Hao Xiao ◽  
Te-Jen Wang ◽  
Yu-Ruei Lian ◽  
...  
Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 340
Author(s):  
Wen-Chung Tsai ◽  
Tzu-Hsuan Tsai ◽  
Te-Jen Wang ◽  
Mao-Lun Chiang

The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance security in lightweight machine-to-machine (M2M) communications, we propose a key update mechanism, namely, double OTP (D-OTP), which combines both one-time password (OTP) and one-time pad to achieve an IoT ecosystem with theoretically unbreakable security. The proposed D-OTP was implemented into the Constrained Application Protocol (CoAP) through the commonly used libcoap library. The experimental results revealed that an additional 8.93% latency overhead was required to obtain an unbreakable guarantee of data transfers in 100 CoAP communication sessions.


2018 ◽  
Vol 72 ◽  
pp. 266-273 ◽  
Author(s):  
Yongfeng Qian ◽  
Yingying Jiang ◽  
Jing Chen ◽  
Yu Zhang ◽  
Jeungeun Song ◽  
...  

Internet of things plays the major innovative role in the enhancement and optimization of habitual behavior by the collaborative usage of smart objects and smart sensors. One of the major challenges that is being faced is secure interconnection of iot devices, sensors, actuators to the cloud. As most of the IoT devices and cloud usage is done using the third party, it is required to provide IoT security such that the attackers cant disturb the communication path through the devies and also to provide secure data transmission from devices to cloud. This paper mainly displays the use of middleware along with Gateway and REST API Technologies for the secure interface between the devices, sensors and storage applications.


2016 ◽  
Vol E99.B (12) ◽  
pp. 2498-2508
Author(s):  
Daisuke MATSUBARA ◽  
Hitoshi YABUSAKI ◽  
Satoru OKAMOTO ◽  
Naoaki YAMANAKA ◽  
Tatsuro TAKAHASHI

Sign in / Sign up

Export Citation Format

Share Document