Cargando…
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7436054/ https://www.ncbi.nlm.nih.gov/pubmed/32751287 http://dx.doi.org/10.3390/s20154221 |
_version_ | 1783572465572642816 |
---|---|
author | Rauf, Abid Wang, Zhaohong Sajid, Hasan Ali Tahir, Muhammad |
author_facet | Rauf, Abid Wang, Zhaohong Sajid, Hasan Ali Tahir, Muhammad |
author_sort | Rauf, Abid |
collection | PubMed |
description | As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. |
format | Online Article Text |
id | pubmed-7436054 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-74360542020-08-24 Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things Rauf, Abid Wang, Zhaohong Sajid, Hasan Ali Tahir, Muhammad Sensors (Basel) Article As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. MDPI 2020-07-29 /pmc/articles/PMC7436054/ /pubmed/32751287 http://dx.doi.org/10.3390/s20154221 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Rauf, Abid Wang, Zhaohong Sajid, Hasan Ali Tahir, Muhammad Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_full | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_fullStr | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_full_unstemmed | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_short | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_sort | secure route-obfuscation mechanism with information-theoretic security for internet of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7436054/ https://www.ncbi.nlm.nih.gov/pubmed/32751287 http://dx.doi.org/10.3390/s20154221 |
work_keys_str_mv | AT raufabid securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT wangzhaohong securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT sajidhasan securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT alitahirmuhammad securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings |