Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things

As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an...

Full description

Bibliographic Details
Main Authors: Abid Rauf, Zhaohong Wang, Hasan Sajid, Muhammad Ali Tahir
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/15/4221
_version_ 1797560928259014656
author Abid Rauf
Zhaohong Wang
Hasan Sajid
Muhammad Ali Tahir
author_facet Abid Rauf
Zhaohong Wang
Hasan Sajid
Muhammad Ali Tahir
author_sort Abid Rauf
collection DOAJ
description As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.
first_indexed 2024-03-10T18:07:29Z
format Article
id doaj.art-86d3ac8bb6274cf0af407de74b4c6eb9
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T18:07:29Z
publishDate 2020-07-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-86d3ac8bb6274cf0af407de74b4c6eb92023-11-20T08:23:21ZengMDPI AGSensors1424-82202020-07-012015422110.3390/s20154221Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of ThingsAbid Rauf0Zhaohong Wang1Hasan Sajid2Muhammad Ali Tahir3National University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science, Islamabad 44000, PakistanDepartment of Electrical and Computer Engineering, California State University, Chico, CA 90802, USANational University of Sciences and Technology (NUST), School of Mechanical and Manufacturing Engineering, Islamabad 44000, PakistanNational University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science, Islamabad 44000, PakistanAs accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.https://www.mdpi.com/1424-8220/20/15/4221information-theoretic securitymultipath routingInternet of things
spellingShingle Abid Rauf
Zhaohong Wang
Hasan Sajid
Muhammad Ali Tahir
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
Sensors
information-theoretic security
multipath routing
Internet of things
title Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_full Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_fullStr Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_full_unstemmed Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_short Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
title_sort secure route obfuscation mechanism with information theoretic security for internet of things
topic information-theoretic security
multipath routing
Internet of things
url https://www.mdpi.com/1424-8220/20/15/4221
work_keys_str_mv AT abidrauf securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT zhaohongwang securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT hasansajid securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings
AT muhammadalitahir securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings