Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Diro, Abebe | - |
dc.contributor.author | Reda, Haftu | - |
dc.contributor.author | Chilamkurti, Naveen | - |
dc.contributor.author | Mahmood, Abdun | - |
dc.contributor.author | Zaman, Noor | - |
dc.contributor.author | Nam, Yunyoung | - |
dc.date.accessioned | 2021-08-11T08:43:53Z | - |
dc.date.available | 2021-08-11T08:43:53Z | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3723 | - |
dc.description.abstract | The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional Internet security architecture and protocols require huge resources and lack of end-to-end security mechanism. In this research, a resource efficient end-to-end security scheme has been proposed by offloading computations and storage of security parameters to fog nodes in the vicinity. In addition, a symmetric-key payload encryption has been used to minimize the overhead of message communication in the resource-contested IoT environment. The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes. The proposed end-to-end security scheme saves more communication bandwidth and incurs less overhead as compared to existing TLS-based security schemes. In particular, the proposed system uses less number of handshakes and achieves a decrease in the number of transmitted messages (approximately 184 bytes as compared to compared TSL message size of 332 bytes) for every handshake. Further, it has been demonstrated through experiments that the proposed security method incurs less overheads as compared to the TLS bandwidth consumption considering a single connection session during message subscription. | - |
dc.format.extent | 13 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2020.2983117 | - |
dc.identifier.scopusid | 2-s2.0-85083402680 | - |
dc.identifier.wosid | 000527413100074 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.8, pp 60539 - 60551 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 60539 | - |
dc.citation.endPage | 60551 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | IOT | - |
dc.subject.keywordAuthor | Encryption | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | cybersecurity | - |
dc.subject.keywordAuthor | end-end security | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | publish-subscribe systems | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.