scholarly journals Lightweight MIPv6 with IPSec Support

2014 ◽  
Vol 10 (1) ◽  
pp. 37-77 ◽  
Author(s):  
Antonio J. Jara ◽  
David Fernandez ◽  
Pablo Lopez ◽  
Miguel A. Zamora ◽  
Antonio F. Skarmeta

Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for constrained devices is feasible.

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6131
Author(s):  
Mamun Abu-Tair ◽  
Soufiene Djahel ◽  
Philip Perry ◽  
Bryan Scotney ◽  
Unsub Zia ◽  
...  

Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested.


Author(s):  
Fadele Ayotunde Alaba ◽  
◽  
Abayomi Jegede ◽  
Christopher Ifeanyi Eke ◽  
◽  
...  

The Internet of Things (IoT) expects to improve human lives with the rapid development of resource-constrained devices and with the increased connectivity of physical embedded devices that make use of current Internet infrastructure to communicate. The major challenging in such an interconnected world of resource-constrained devices and sensors are security and privacy features. IoT is demand new approaches to security like a secure lightweight authentication technique, scalable approaches to continuous monitoring and threat mitigation, and new ways of detecting and blocking active threats. This paper presents the proposed security framework for IoT network. A detail understanding of the existing solutions leads to the development of security framework for IoT network. The framework was developed using cost effective design approach. Two components are used in developing the protocol. The components are Capability Design (mainly a ticket, token or key that provides authorization to access a device) and Advanced Encryption Standard (AES)-Galois Counter Mode (GCM) (a-security protocol for constrained IoT devices). AES-GCM is an encryption process that is based on authentication and well suitable IoT.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3375 ◽  
Author(s):  
Luis Sánchez ◽  
Jorge Lanza ◽  
Juan Santana ◽  
Rachit Agarwal ◽  
Pierre Raverdy ◽  
...  

The Internet of Things (IoT) concept has attracted a lot of attention from the research and innovation community for a number of years already. One of the key drivers for this hype towards the IoT is its applicability to a plethora of different application domains. However, infrastructures enabling experimental assessment of IoT solutions are scarce. Being able to test and assess the behavior and the performance of any piece of technology (i.e., protocol, algorithm, application, service, etc.) under real-world circumstances is of utmost importance to increase the acceptance and reduce the time to market of these innovative developments. This paper describes the federation of eleven IoT deployments from heterogeneous application domains (e.g., smart cities, maritime, smart building, crowd-sensing, smart grid, etc.) with over 10,000 IoT devices overall which produce hundreds of thousands of observations per day. The paper summarizes the resources that are made available through a cloud-based platform. The main contributions from this paper are twofold. In the one hand, the insightful summary of the federated data resources are relevant to the experimenters that might be seeking for an experimental infrastructure to assess their innovations. On the other hand, the identification of the challenges met during the testbed integration process, as well as the mitigation strategies that have been implemented to face them, are of interest for testbed providers that can be considering to join the federation.


Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 195
Author(s):  
Davide Andrea Guastella ◽  
Guilhem Marcillaud ◽  
Cesare Valenti

Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis; on the other hand, it involves different challenges such as intermittent sensors and integrity of acquired data. To this effect, edge computing emerges as a methodology to distribute computation among different IoT devices to analyze data locally. We present here a new methodology for imputing environmental information during the acquisition step, due to missing or otherwise out of order sensors, by distributing the computation among a variety of fixed and mobile devices. Numerous experiments have been carried out on real data to confirm the validity of the proposed method.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Chao Huang ◽  
Shah Nazir

With the passage of time, the world population is growing. Proper utilization of resources and other devices is tremendously playing an important role to easily examine, manage, and control the resources of the Internet of Things (IoT) in the smart city. Research in the field of IoT has revolutionized the services mostly in smart cities. In the smart city, the applications of IoT are utilized without human involvement. Diverse IoT devices are connected with each other and communicate for different tasks. With the existence of a huge number of IoT devices in the forthcoming years, the chances of privacy breach and information leakage are increasing. Billions of devices connected on IoT producing huge volume of data bound to cloud for processing, management, and storage. Sending of whole data to the cloud might create risk of security and privacy. Various needs of the smart city should be considered for both urgent and effective solutions to support requirements of the growing population. On the other side of rising technology, the IoT evolution has massively produced diverse research directions for the smart city. Keeping in view the use cases of the smart city, the proposed study presents the analytic network process (ANP) for evaluating smart cities. The approach of ANP works well in the situation of complexity, and vagueness exists among the available alternatives. The experimental results of the planned approach show that the approach is effective for evaluating the smart cities for IoT based on the use cases.


2021 ◽  
Vol 13 (16) ◽  
pp. 9092
Author(s):  
Amjad Rehman ◽  
Khalid Haseeb ◽  
Tanzila Saba ◽  
Jaime Lloret ◽  
Zara Ahmed

The Internet of Things (IoT) is an emerging technology and provides connectivity among physical objects with the support of 5G communication. In recent decades, there have been a lot of applications based on IoT technology for the sustainability of smart cities, such as farming, e-healthcare, education, smart homes, weather monitoring, etc. These applications communicate in a collaborative manner between embedded IoT devices and systematize daily routine tasks. In the literature, many solutions facilitate remote users to gather the observed data by accessing the stored information on the cloud network and lead to smart systems. However, most of the solutions raise significant research challenges regarding information sharing in mobile IoT networks and must be able to stabilize the performance of smart operations in terms of security and intelligence. Many solutions are based on 5G communication to support high user mobility and increase the connectivity among a huge number of IoT devices. However, such approaches lack user and data privacy against anonymous threats and incur resource costs. In this paper, we present a mobility support 5G architecture with real-time routing for sustainable smart cities that aims to decrease the loss of data against network disconnectivity and increase the reliability for 5G-based public healthcare networks. The proposed architecture firstly establishes a mutual relationship among the nodes and mobile sink with shared secret information and lightweight processing. Secondly, multi-secured levels are proposed to protect the interaction with smart transmission systems by increasing the trust threshold over the insecure channels. The conducted experiments are analyzed, and it is concluded that their performance significantly increases the information sustainability for mobile networks in terms of security and routing.


Symmetry ◽  
2021 ◽  
Vol 13 (1) ◽  
pp. 129
Author(s):  
Badr M. Alshammari ◽  
Ramzi Guesmi ◽  
Tawfik Guesmi ◽  
Haitham Alsaif ◽  
Ahmed Alzamil

In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor’s resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.


2021 ◽  
Vol 2 (2) ◽  
pp. 1-25
Author(s):  
Cong Shi ◽  
Jian Liu ◽  
Hongbo Liu ◽  
Yingying Chen

User authentication is a critical process in both corporate and home environments due to the ever-growing security and privacy concerns. With the advancement of smart cities and home environments, the concept of user authentication is evolved with a broader implication by not only preventing unauthorized users from accessing confidential information but also providing the opportunities for customized services corresponding to a specific user. Traditional approaches of user authentication either require specialized device installation or inconvenient wearable sensor attachment. This article supports the extended concept of user authentication with a device-free approach by leveraging the prevalent WiFi signals made available by IoT devices, such as smart refrigerator, smart TV, and smart thermostat, and so on. The proposed system utilizes the WiFi signals to capture unique human physiological and behavioral characteristics inherited from their daily activities, including both walking and stationary ones. Particularly, we extract representative features from channel state information (CSI) measurements of WiFi signals, and develop a deep-learning-based user authentication scheme to accurately identify each individual user. To mitigate the signal distortion caused by surrounding people’s movements, our deep learning model exploits a CNN-based architecture that constructively combines features from multiple receiving antennas and derives more reliable feature abstractions. Furthermore, a transfer-learning-based mechanism is developed to reduce the training cost for new users and environments. Extensive experiments in various indoor environments are conducted to demonstrate the effectiveness of the proposed authentication system. In particular, our system can achieve over 94% authentication accuracy with 11 subjects through different activities.


Author(s):  
I Wayan Krisnhadi Bima ◽  
Vera Suryani ◽  
Aulia Arif Wardana

Internet of Things (IoT) refers to a concept connecting any devices onto the internet. The IoT devices cannot only use a service or server to be controlled at a distance but also to do computation. IoT has been applied in many fields, such as smart cities, industries, and logistics. The sending of IoT data can use the existing GSM networks such as GPRS. However, GPRS is not dedicated particularly to the transmission of IoT data in consideration of its weaknesses in terms of coverage and power efficiency. To increase the performance of the transmission of IoT data, Narrowband-IoT (NB-IoT), one alternative to replace GPRS, is offered for its excellence in coverage and power. This paper aims to compare the GPRS and NB-IoT technology for the transmission of IoT data, specifically in Bandung region, Indonesia. The results obtained showed that the packet loss from clients for the GPRS network was at 68%, while the one for NB-IoT was at 44%. Moreover, NB-IoT technology was found excellent in terms of battery saving compared to GPRS for the transmission of IoT data. This result showed that NB-IoT was found more suitable for transmitting the IoT data compared to GPRS.


Author(s):  
Manikandakumar Muthusamy ◽  
Karthikeyan Periasamy

Internet of things is a growing technology with many business opportunities and risks. It is strongly believed that IoT will cause a major shift in people's lives similar to how the internet transformed the way people communicate and share information. IoT is becoming popular in the various domains such as smart health, smart cities, smart transport, and smart retail. The security and privacy concerns of IoT are crucial as it connects a large number of devices. Security is a more critical issue that certainly needs to be resolved with a high level of attention, as with an increasing number of users, there would be a need to manage their requests and check authenticity on the cloud-based pattern. Recently, a series of massive distributed denial-of-service attacks have occurred in IoT organizations. Such malicious attacks have highlighted the threats resulting from not enough security in IoT devices together with their overwhelming effects on the internet. This chapter provides an overview of the security attacks with regard to IoT technologies, protocols, and applications.


Sign in / Sign up

Export Citation Format

Share Document