scholarly journals An Anonymous Inter-Network Routing Protocol for the Internet of Things

Author(s):  
Paolo Palmieri ◽  
Luca Calderoni ◽  
Dario Maio

With the diffusion of the Internet of Things (IoT), computing is becoming increasingly pervasive, and different heterogeneous networks are integrated into larger systems. However, as different networks managed by different parties and with different security requirements are interconnected, security becomes a primary concern. IoT nodes, in particular, are often deployed “in the open”, where an attacker can gain physical access to the device. As nodes can be deployed in unsurveilled or even hostile settings, it is crucial to avoid escalation from successful attacks on a single node to the whole network, and from there to other connected networks. It is therefore necessary to secure the communication within IoT networks, and in particular, maintain context information private, including the network topology and the location and identity of the nodes. In this paper, we propose a protocol achieving anonymous routing between different interconnected networks, designed for the Internet of Things and based on the spatial Bloom filter (SBF) data structure. The protocol enables private communication between the nodes through the use of anonymous identifiers, which hide their location and identity within the network. As routing information is encrypted using a homomorphic encryption scheme, and computed only in the encrypted domain, the proposed routing strategy preserves context privacy, preventing adversaries from learning the network structure and topology. This, in turn, significantly reduces their ability to gain valuable network information from a successful attacks on a single node of the network, and reduces the potential for attack escalation.  

2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2017 ◽  
Vol 13 (12) ◽  
pp. 155014771774974 ◽  
Author(s):  
Anum Talpur ◽  
Faisal K Shaikh ◽  
Thomas Newe ◽  
Adil A Sheikh ◽  
Emad Felemban ◽  
...  

Author(s):  
Orestis Mavropoulos ◽  
Haralambos Mouratidis ◽  
Andrew Fish ◽  
Emmanouil Panaousis ◽  
Christos Kalloniatis

2014 ◽  
Vol 556-562 ◽  
pp. 5852-5854
Author(s):  
Ying Wei

The internet of things perception and recognition by the ubiquitous information to the physical world. Ad Hoc provide suitable network environment to the internet of things, whose routing protocol Protect data transmission efficient and reliable. This paper not only analyzes the particularity of Ad Hoc network technology in the Internet of Things, but also simulates AODV and DSDV in test environment to analysis the communication performance in the internet of things.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5897
Author(s):  
Shantanu Pal ◽  
Michael Hitchens ◽  
Tahiry Rabehaja ◽  
Subhas Mukhopadhyay

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.


Open Physics ◽  
2018 ◽  
Vol 16 (1) ◽  
pp. 656-662 ◽  
Author(s):  
Jianhou Gan ◽  
Xingchao Wang ◽  
Juxiang Zhou ◽  
Lin Tang ◽  
Lingyun Yuan

Abstract With the development of the Internet of Things (IoT), a new and important research direction is possible using IoT to solve the problems of information and intelligence in the metallurgical industry. This paper proposes an intelligent monitoring network based on networking technology and uses the coking process as the research object. The construction of a coking process intelligence monitoring network should focus on the formation of a perception layer network and build on a ZigBee mesh clustered network. Moreover, it also puts forward a network routing establishment and data transmission mechanism. This study provides an effective reference for the wide application of the IoT in the intelligent management and monitoring of the metallurgical process.


Sign in / Sign up

Export Citation Format

Share Document