Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communicationopen access
- Authors
- Diro, Abebe; Reda, Haftu; Chilamkurti, Naveen; Mahmood, Abdun; Zaman, Noor; Nam, Yunyoung
- Issue Date
- 2020
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Keywords
- Encryption; authentication; cybersecurity; end-end security; Internet of Things; publish-subscribe systems
- Citation
- IEEE Access, v.8, pp 60539 - 60551
- Pages
- 13
- Journal Title
- IEEE Access
- Volume
- 8
- Start Page
- 60539
- End Page
- 60551
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3723
- DOI
- 10.1109/ACCESS.2020.2983117
- ISSN
- 2169-3536
- Abstract
- The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional Internet security architecture and protocols require huge resources and lack of end-to-end security mechanism. In this research, a resource efficient end-to-end security scheme has been proposed by offloading computations and storage of security parameters to fog nodes in the vicinity. In addition, a symmetric-key payload encryption has been used to minimize the overhead of message communication in the resource-contested IoT environment. The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes. The proposed end-to-end security scheme saves more communication bandwidth and incurs less overhead as compared to existing TLS-based security schemes. In particular, the proposed system uses less number of handshakes and achieves a decrease in the number of transmitted messages (approximately 184 bytes as compared to compared TSL message size of 332 bytes) for every handshake. Further, it has been demonstrated through experiments that the proposed security method incurs less overheads as compared to the TLS bandwidth consumption considering a single connection session during message subscription.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Computer Science and Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3723)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.