Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/15/4221 |
_version_ | 1797560928259014656 |
---|---|
author | Abid Rauf Zhaohong Wang Hasan Sajid Muhammad Ali Tahir |
author_facet | Abid Rauf Zhaohong Wang Hasan Sajid Muhammad Ali Tahir |
author_sort | Abid Rauf |
collection | DOAJ |
description | As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. |
first_indexed | 2024-03-10T18:07:29Z |
format | Article |
id | doaj.art-86d3ac8bb6274cf0af407de74b4c6eb9 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T18:07:29Z |
publishDate | 2020-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-86d3ac8bb6274cf0af407de74b4c6eb92023-11-20T08:23:21ZengMDPI AGSensors1424-82202020-07-012015422110.3390/s20154221Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of ThingsAbid Rauf0Zhaohong Wang1Hasan Sajid2Muhammad Ali Tahir3National University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science, Islamabad 44000, PakistanDepartment of Electrical and Computer Engineering, California State University, Chico, CA 90802, USANational University of Sciences and Technology (NUST), School of Mechanical and Manufacturing Engineering, Islamabad 44000, PakistanNational University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science, Islamabad 44000, PakistanAs accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.https://www.mdpi.com/1424-8220/20/15/4221information-theoretic securitymultipath routingInternet of things |
spellingShingle | Abid Rauf Zhaohong Wang Hasan Sajid Muhammad Ali Tahir Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things Sensors information-theoretic security multipath routing Internet of things |
title | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_full | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_fullStr | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_full_unstemmed | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_short | Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things |
title_sort | secure route obfuscation mechanism with information theoretic security for internet of things |
topic | information-theoretic security multipath routing Internet of things |
url | https://www.mdpi.com/1424-8220/20/15/4221 |
work_keys_str_mv | AT abidrauf securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT zhaohongwang securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT hasansajid securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings AT muhammadalitahir securerouteobfuscationmechanismwithinformationtheoreticsecurityforinternetofthings |