Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks

Full Text (PDF, 744KB), PP.28-35

Views: 0 Downloads: 0

Author(s)

G.V.Hindumathi 1,* D. Lalitha Bhaskari 2

1. Computer Science & Engineering Department, JNTUK, Kakinada

2. Computer Science and Systems Engineering, Andhra University, Visakhapatnam

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.11.04

Received: 14 Jul. 2019 / Revised: 20 Jul. 2019 / Accepted: 24 Jul. 2019 / Published: 8 Nov. 2019

Index Terms

Key distribution, Random key generation, Seed value, Session Key, AES algorithm

Abstract

Internets of Things (IoT) are distinguished by different devices, which support the ability to provide innovative services in various applications. The main aspects of security which involves maintaining confidentiality and authentication of data, integrity within the IoT network, privacy and trust among IoT devices are important issues to be addressed. Conventional security policies cannot be used directly to IoT devices due to the limitation of memory and high power consumption factors. One of the security breaches in the intranet is lack of encryption due to the IoT devices infrastructure. The basic IoT devices are 8-bit, low-cost, limited memory and power consumption devices which limit the complex algorithm execution. The key distribution is another major challenge in IoT network.
This paper proposes a solution to transmitting messages by adopting Random Number generation and distribution of session key for every message without any difficulty. It gives better result to resist from the brute force attack in a network.

Cite This Paper

G.V.Hindumathi, D. Lalitha Bhaskari, "Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.11, pp.28-35, 2019. DOI:10.5815/ijcnis.2019.11.04

Reference

[1]Newsletter, Lack of security in the Internet of Things devices. Study by HP (https://link.springer.com/chapter/10.1007/9 78-3-319-50758-3_3)
[2]Weber, Rolf H., and EvelyneStuder. "Cybersecurity in the Internet of Things: Legal aspects." Computer Law & Security Review 32, no. 5 (2016): 715-728.
[3]Babar, Sachin, ParikshitMahalle, AntoniettaStango, Neeli Prasad, and Ramjee Prasad. "Proposed security model and threat taxonomy for the Internet of Things (IoT)." In International Conference on Network Security and Applications, pp. 420-429. Springer,Berlin, Heidelberg, 2010.
[4]Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things." Computer Networks 57, no. 10 (2013): 2266-2279.
[5]Alaba, FadeleAyotunde, Mazliza Othman, Ibrahim AbakerTargioHashem, and FaizAlotaibi. "Internet of Things security: A survey." Journal of Network and Computer Applications 88 (2017): 10-28.
[6]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44, no. 9 (2011): 51-58.
[7]Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "Secure routing for internet of things: A survey." Journal of Network and Computer Applications 66 (2016): 198-213.
[8]Stankovic, John A. "Research directions for the internet of things." IEEE Internet ofThings Journal 1, no. 1 (2014): 3-9.
[9]Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and DechaoQiu. "Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
[10]Wood, Anthony D., Lei Fang, John A. Stankovic, and Tian He. "SIGF: a family of configurable, secure routing protocols for wireless sensor networks." In Proceedings of thefourth ACM workshop on Security of ad hoc and sensor networks, pp. 35-48. ACM, 2006.
[11]Ravi, Srivaths, AnandRaghunathan, and SrimatChakradhar. "Tamper resistance mechanisms for secure embedded systems." In VLSI Design, 2004. Proceedings. 17thInternational Conference on, pp. 605- 611. IEEE, 2004.
[12]Bandyopadhyay, Debasis, and Jaydip Sen. "Internet of things: Applications and challenges in technology and standardization." Wireless Personal Communications 58, no. 1 (2011): 49-69.
[13]Zhang, Zhi-Kai, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong- Kuan Chen, and ShiuhpyngShieh. "IoT security: ongoing challenges and research opportunities." In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7thInternational Conference on, pp. 230-234. IEEE, 2014.
[14]Nguyen, Kim Thuat, Maryline Laurent, and NouhaOualha. "Survey on secure communication protocols for the Internet of Things." Ad Hoc Networks 32 (2015): 17- 31.
[15]Vazirani, Umesh V., and Vijay V. Vazirani. "Efficient and secure pseudo-random number generation." In Foundations of Computer Science, 1984. 25th Annual Symposium on, pp. 458-463. IEEE, 1984.
[16]Abdullah, AkoMuhamad. "Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data." (2017).