TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT.
DOI:
https://doi.org/10.9781/ijimai.2020.10.002Keywords:
Cryptography, Elliptic Curve Cryptography (ECC), Internet of things, Nth-degree Truncated Polynomial Ring Units (NTRU), Security, Confidenciality, Integrity, Confidentiality, Integrity, and Availability (CIA)Abstract
The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, eHealth, and several real-world applications by connecting domain-specific sensors. Designing a security model for these applications is challenging for researchers since attacks (for example, zero-day) are increasing tremendously. Several security methods have been developed to ensure the CIA (Confidentiality, Integrity, and Availability) for Industrial IoT (IIoT). Though these methods have shown promising results, there are still some security issues that are open. Thus, the security and authentication of IoT based applications become quite significant. In this paper, we propose TD2SecIoT (Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT), which incorporates Elliptic Curve Cryptography (ECC) and Nth-degree Truncated Polynomial Ring Units (NTRU) methods to ensure confidentiality and integrity. The proposed method has been evaluated against different attacks and performance measures (quantitative and qualitative) using the Cooja network simulator with Contiki-OS. The TD2SecIoT has shown a higher security level with reduced computational cost and time.
Downloads
References
[1] A. R. Sfar, Z. Chtourou, and Y. Challal, “A systemic and cognitive vision for IoT security: a case study of military live simulation and security challenges,” Smart, Monit. Control. Cities, IEEE, 2017, pp. 17–19.
[2] Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R. and Tarkoma, S., 2017, June. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177-2184
[3] Frustaci, Mario, Pasquale Pace, Gianluca Aloi, and Giancarlo Fortino. “Evaluating critical security issues of the IoT world: Present and future challenges.” IEEE Internet of things journal, vol. 5, no. 4, 2017, pp. 2483- 2495.
[4] Zhai, Chuanying, Zhuo Zou, Qiang Chen, Lida Xu, Li-Rong Zheng, and Hannu Tenhunen. “Delay-aware and reliability-aware contentionfree MF–TDMA protocol for automated RFID monitoring in industrial IoT.” Journal of Industrial Information Integration, vol. 3, 2016, pp. 8-19.
[5] S. N. Swamy, D. Jadhav, and N. Kulkarni, “Security threats in the application layer in IOT applications. In International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, 2017, pp. 477-480.
[6] Cheng, Jiangfeng, Weihai Chen, Fei Tao, and Chun-Liang Lin. “Industrial IoT in 5G environment towards smart manufacturing.” Journal of Industrial Information Integration, vol. 10, 2018, pp. 10-19.
[7] S. Vashi, J. Ram, J. Modi, S. Verma and C. Prakash, “Internet of Things (IoT): A vision, architectural elements, and security issues,” 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 492-496.
[8] Urquhart, Lachlan, and Derek McAuley. “Avoiding the internet of insecure industrial things.” Computer law & security review, vol. 34, n. 3, 2018, pp. 450-466.
[9] L. Urquhart and D. McAuley, “Avoiding the Internet of Insecure Industrial Things,” Comput. Law Secur. Rev. Elsevier, 2017, pp. 1–17.
[10] Yousefi, A. and Jameii, S.M., 2017, May. Improving the security of internet of things using encryption algorithms. In 2017 IEEE International Conference on IoT and Application (ICIOT), pp. 1-5.
[11] R. Marwat, “Internet of Things.” [Online]. Available: https://www.slideshare.net/RehmatMarwat/introduction-to-internet-ofthings-45172425. [Accessed: 07-Aug-2019].
[12] R. Elhabob, Y. Zhao, I. Sella, and H. Xiong, “An efficient certificateless public key cryptography with authorized equality test in IIoT”. Journal of Ambient Intelligence and Humanized Computing, Springer, vol. 11, n. 3, 2020, pp. 1065-1083.
[13] Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. “The industrial internet of things (IIoT): An analysis framework”, Computers in industry, Elsevier, 2018, Vol. 101, pp. 1-12.
[14] A. A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for Internet of Things,” Futur. Gener. Comput. Syst. Elsevier, 2017, pp. 761-768.
[15] S. Vashi, J. Ram and J. Modi, “A Vision, Architectural Elements, and Security Issues” in International conference on I-SMAC, IEEE,2017, pp. 492-496.
[16] S. B. S.- Smieee, “Cryptosystems used in IoT- Current Status and Challenges,” ICCIT, IEEE, 2017, pp. 58–62.
[17] D. Rivera, A. Garc, L. Mart, B. Alarcos, and G. Ana, “Secure Communications and Protected Data for an Internet of Things Smart Toy Platform,” J. Internet of Things, IEEE, vol. 4662, 2019, pp. 1–11.
[18] V. C. Ashan, “Implementation of WG Stream Cipher with Involution Function,” Procedia Technol., vol. 24, 2016, pp. 790–795.
[19] L. Ding, C. Jin, J. Guan, and Q. Wang, “Cryptanalysis of Lightweight WG-8 Stream Cipher,” ICCIT, IEEE, vol. 9, n. 4, 2014, pp. 645–652.
[20] T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, “TWINE: A Lightweight Block Cipher,” Lect. Notes Comput. Sci., vol. 7707, 2013, pp. 339–354.
[21] W. Diehl, F. Farahmand, P. Yalla, J. Kaps, K. Gaj, and C. Engineering, “Comparison of Hardware and Software Implementations of Selected Lightweight Block Ciphers,” International Conference on Field Programmable Logic and Applications (FPL), IEEE, 2017, pp. 1-4.
[22] L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci. Elsevier, vol. 54, n. 1, 2015, pp. 73–82.
[23] T. D. P. Bai, K. M. Raj, and S. A. Rabara, “Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card,” WCCCT, IEEE, 2016, pp. 1–4.
[24] F. Özdemir Sönmez, “A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency” Procedia Comput. Sci. Elsevier, vol. 54, no. 1, 2019, pp. 181–188.
[25] A. Bansal, “Providing Security, Integrity and Authentication Using ECC Algorithm in cloud storage,” International Conference on Computer Communication and Informatics (ICCCI), IEEE, 2017, pp. 1-5. [26] S. R. Singh, “Performance Evaluation of RSA and Elliptic Curve Cryptography,” Trans. Inf. Secur, vol. 65537, IEEE, 2016, pp. 302–306.
[27] S. K. Shankar, A. S. Tomar, and G. K. Tak, “Secure Medical Data Transmission by using ECC with Mutual Authentication in WSNs,” Ecofriendly Comput. Commun. Syst. vol. 70, Elsevier, 2015, pp. 455–461.
[28] P. D. K. and S. Kalra, “Elliptic Curve Cryptography for Real Time,” Futur. Gen. Comp., IEEE, 2016 pp. 1–6.
[29] H. Hasan, T Salah, D Shehada., “Secure Lightweight ECC-Based Protocol for Multi- Agent IoT Systems,” 13th Int. Conf. Wirel. Mob. Comput. IEEE, 2017, pp. 1-8.
[30] M. Ahmad, F. Khan, M. Alam, and M. Usman, “A payload-based mutual authentication scheme for Internet of Things,” Futur. Gener. Comput. Syst. Elsevier, 2017, pp. 1028-1039.
[31] P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, DES, 3DES, AES, RSA and Blowfish,” Procedia - Procedia Comput. Sci. Elsevier, vol. 78, 2016, pp. 617–624.
[32] M. Bunder, A. Nitaj, W. Susilo, and J. Tonien, “A generalized attack on RSA type cryptosystems” Theor. Comput. Sci. vol. 704, Elsevier, 2017, pp. 74–81.
[33] D. John and L. Martin, “Binary RSA Encryption Algorithm,”, In International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), IEEE, 2016, pp. 178–181.
[34] A. Mektoubi, H. L. Hassani, H. Belhadaoui, and Rifi, “New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve,” Third International Conference on Systems of Collaboration, IEEE, 2016, pp. 1-6.
[35] J. Wang, K Han, A Alexandridis, Z Zilic, Y Pang, W Wu., “A novel security scheme for Body Area Networks compatible with smart vehicles,” Comput. Networks, Elsevier, vol. 143, 2018, pp. 74–81.
[36] S. Singh, S Padhye “Cryptanalysis of NTRU with n Public Keys,” In Asia Security and Privacy (ISEASP), IEEE, 2017, pp. 1-6.
[37] R. Tso and Y.-S. Jheng, “Security Analysis of a NTRU-based Mutual Authentication Scheme,” In 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, 2016, pp. 1-3.
[38] R. Chen and D. Peng, “A novel NTRU-based handover authentication scheme for wireless networks,” Futur. gen. comp, vol. 7798, IEEE, 2017, pp. 1–4.
[39] Y. Gao, X. Yin, C. Hao, “Sequential Digital Multi-Signature Scheme Based on NTRU,” Int. Conf. Comput. Commun. IEEE, 2016, pp. 236–240.
[40] H. R. Yassein and N. M. Al-saidi, “A Comparative Performance Analysis of NTRU and Its Variant Cryptosystems,” In International Conf. on Current Research in Computer Science and Information Technology (ICCIT), IEEE, 2017, pp. 115-120.
[41] R. Jha and A. K. Saini, “A Comparative Analysis & Enhancement of NTRU Algorithm for Network Security and Performance Improvement,” In International Conference on Communication Systems and Network Technologies, IEEE, 2011, pp. 80–84.
[42] A. Joshi, S. Dhongdi, K. R. Anupama, P. Nahar and Rishabh Sethunathan,” Implementation of Protocol Stack for Three-DimensionalWireless Sensor Network”,Procedia Comput. Sci. Elsevier, vol. 54, no. 1, 2016, pp. 193–202.
[43] I. Romdhani, “Cooja_Simulator_Manual.” [Online]. Available: https://www.researchgate.net/publication/304572240_Cooja_Simulator_Manual. [Accessed: 07-Aug-2019].
[44] X. Shen, Z. Du, and R. Chen, “Research on NTRU algorithm for mobile java security”. International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing, pp. 366-369, 2009, IEEE.
[45] M. J. Kaur and P. Maheshwari, “Building Smart Cities Applications using IoT and Cloud-based Architectures,” In International Conference on Industrial Informatics and Computer Systems (CIICS), IEEE, 2016, pp. 1-5.
[46] Tmote Sky: Product Description. [Online] http://www.eecs.harvard.edu/~konrad/projects/shimmer/references/tmote-sky-datasheet.pdf. [Accessed: 11-Aug-2019].
[47] P. K. Panda, “A Hybrid Security Algorithm for RSA Cryptosystem,” In International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, 2017, pp. 1-6.
[48] T. K. Goyal and V. Sahula, “Lightweight security algorithm for low power IoT devices,” In Int. Conf. Adv. Comput. Commun. Informatics, IEEE, 2016, pp. 1725–1729.
[49] S. Athmani, A. Bilami, and D. E. Boubiche, “EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs,” In Future Generation Computer Systems, Vol. 92, Elsevier,2019, pp. 789-799.
[50] J. Bozzelli, “Temprature sensors,” 2014. [Online]. Available: https://www.ptonline.com/columns/how-to-set-barrel-zone-temps. [Accessed: 25- Jun-2020].
[51] J. Sengupta, S. Ruj, and S. D. Bit “A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT”, Journal of Network and Computer Applications, 149, p. 102481, 2020.
[52] Tiwari, Vivek, and Basant Tiwari. “A Data Driven Multi-Layer Framework of Pervasive Information Computing System for eHealthcare”, International Journal of E-Health and Medical Communications (IJEHMC), vol. 10, n. 4, 2019, pp. 66-85.
[53] Choudhary, M., Tiwari, V., & Venkanna, U., “Iris anti-spoofing through score-level fusion of handcrafted and data-driven features”, Applied Soft Computing, vol. 91, 106206, 2020 Elsevier. https://doi.org/10.1016/j. asoc.2020.106206,
[54] Yadav, Sonal, Vivek Tiwari, and Basant Tiwari. “Privacy preserving data mining with abridge time using vertical partition decision tree.” In Proceedings of the ACM Symposium on Women in Research 2016, pp. 158-164.
[55] Nema, Aditi, Basant Tiwari, and Vivek Tiwari. “Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction.” In Proceedings of the ACM Symposium on Women in Research 2016, pp. 26-31.
[56] Suo, Hui, Jiafu Wan, Caifeng Zou, and Jianqi Liu. “Security in the internet of things: a review.” In 2012 IEEE international conference on computer science and electronics engineering, 2012, vol. 3, pp. 648-651.
Downloads
Published
-
Abstract240
-
PDF70






