Cargando…

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things

As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an...

Descripción completa

Detalles Bibliográficos
Autores principales: Rauf, Abid, Wang, Zhaohong, Sajid, Hasan, Ali Tahir, Muhammad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7436054/
https://www.ncbi.nlm.nih.gov/pubmed/32751287
http://dx.doi.org/10.3390/s20154221
_version_ 1783572465572642816
author Rauf, Abid
Wang, Zhaohong
Sajid, Hasan
Ali Tahir, Muhammad
author_facet Rauf, Abid
Wang, Zhaohong
Sajid, Hasan
Ali Tahir, Muhammad
author_sort Rauf, Abid
collection PubMed
description As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.
format Online
Article
Text
id pubmed-7436054
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-74360542020-08-24 Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things Rauf, Abid Wang, Zhaohong Sajid, Hasan Ali Tahir, Muhammad Sensors (Basel) Article As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. MDPI 2020-07-29 /pmc/articles/PMC7436054/ /pubmed/32751287 http://dx.doi.org/10.3390/s20154221 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Rauf, Abid
Wang, Zhaohong
Sajid, Hasan
Ali Tahir, Muhammad
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_full Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_fullStr Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_full_unstemmed Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_short Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_sort secure route-obfuscation mechanism with information-theoretic security for internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7436054/
https://www.ncbi.nlm.nih.gov/pubmed/32751287
http://dx.doi.org/10.3390/s20154221
work_keys_str_mv AT raufabid securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT wangzhaohong securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT sajidhasan securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT alitahirmuhammad securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings