Skip to main content
Log in

Reliable and secure data transfer in IoT networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521–26544.

    Article  Google Scholar 

  2. Abu Mansour, H. Y., & Elayyan, H. (2018). IoT theme for smart datamining-based environment to unify distributed learning management systems. In 2018 9th International Conference on Information and Communication Systems (ICICS) (pp. 212–217).

  3. Aman, M. S., Quint, C. D., Abdelgawad, A., & Yelamarthi, K. (2017). Sensing and classifying indoor environments: An iot based portable tour guide system. In 2017 IEEE Sensors Applications Symposium (SAS) (pp. 1–6).

  4. Li, R., Asaeda, H., & Li, J. (2017). A distributed publisher-driven secure data sharing scheme for information-centric IoT. IEEE Internet of Things Journal, 4(3), 791–803.

    Article  Google Scholar 

  5. Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet of Things Journal, 5(1), 269–282.

    Article  Google Scholar 

  6. Maheshwari, N., & Dagale, H. (2018). Secure communication and firewall architecture for IoT applications. In 2018 10th International Conference on Communication Systems Networks (COMSNETS) (pp. 328–335).

  7. Torre, I., Koceva, F., Sanchez, O. R., Adorni, G. (2016). A framework for personal data protection in the IoT. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 384–391).

  8. Gochhayat, S. P., Kaliyar, P., Conti, M., Tiwari, P., Prasath, V. B. S., Gupta, D., et al. (2019). LISA: Lightweight context-aware IoT service architecture. Journal of Cleaner Production, 212, 1345–1356.

    Article  Google Scholar 

  9. Li, Q. Q., Prasad Gochhayat, S., Conti, M., & Liu, F. A. (2017). EnergIoT: A solution to improve network lifetime of IoT devices. Pervasive and Mobile Computing, 42, 124–133.

    Article  Google Scholar 

  10. Oh, S., & Kim, Y. (2017). Security requirements analysis for the IoT. In 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1–6).

  11. Conti, M., Kaliyar, P., & Lal, C. (2017). Remi: A reliable and secure multicast routing protocol for IoT networks. In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17 (pp. 84:1–84:8).

  12. Myles, G., Friday, A., & Davies, N. (2003). Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1), 56–64.

    Article  Google Scholar 

  13. Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X., & Luo, H. H. (2015). Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Communications, 22(4), 104–112.

    Article  Google Scholar 

  14. Chen, D., Bovornkeeratiroj, P., Irwin, D., & Shenoy, P. (2018). Private memoirs of iot devices: Safeguarding user privacy in the IoT era. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 1327–1336).

  15. Liu, X., Leon-Garcia, A., & Zhu, P. (2017). A distributed software-defined multi-agent architecture for unifying IoT applications. In 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 49–55). BC: Vancouver.

  16. Hasan et al., H. (2017). Secure lightweight ECC-based protocol for multi-agent IoT systems. In IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome (pp. 1–8).

  17. Conti, M., Kaliyar, P., Rabbani, M.M., & Ranise, S. (2018). SPLIT: A secure and scalable RPL routing protocol for Internet of Things. In 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol (pp. 1–8).

  18. Castiglione, A., Santis, A. D., Castiglione, A., Palmieri, F., & Fiore, U. (2013). An energy-aware framework for reliable and secure end-to-end ubiquitous data communications. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, INCOS ’13 (pp. 157–165). IEEE Computer Society, Washington, DC, USA.

  19. Allcock, B., Bester, J., Bresnahan, J., Chervenak, A., Kesselman, C., Meder, S., Nefedova, V., Quesnel, D., Tuecke, S., Foster, I. (2001). Secure, efficient data transport and replica management for high-performance data-intensive computing. In Eighteenth IEEE Symposium on Mass Storage Systems and Technologies, 2001. MSS ’01 (pp. 13–13).

  20. Roth, J. (2002). Context-aware web applications using the pinpoint infrastructure. In IADIS International Conference WWW/Internet 2002 (pp. 13–15). IADIS Press.

  21. Jones, V., & Jo, J. H. (2004). Ubiquitous learning environment: An adaptive teaching system using ubiquitous technology. In Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference (vol. 468, p. 474).

  22. Chiu, D. K., & Leung, H. F. (2005). Towards ubiquitous tourist service coordination and integration: A multi-agent and semantic web approach. In Proceedings of the 7th International Conference on Electronic Commerce (pp. 574–581). ACM.

  23. Ardissono, L., Goy, A., Petrone, G., Segnan, M., & Torasso, P. (2002). Ubiquitous user assistance in a tourist information server. In Adaptive hypermedia and adaptive web-based systems (pp. 14–23). Springer.

  24. Carlier, F., & Renault, V. (2016). Iot-a, embedded agents for smart internet of things: Application on a display wall. In 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW) (pp. 80–83).

  25. Cicirello, V., Peysakhov, M., Anderson, G., Naik, G., Tsang, K., Regli, W., et al. (2004). Designing dependable agent systems for mobile wireless networks. IEEE Intelligent Systems, 19(5), 39–45.

    Article  Google Scholar 

  26. Anderson, G., Burnheimer, A., Cicirello, V., Dorsey, D., Garcia, S., Kam, M., Kopena, J., Malfettone, K., Mroczkowski, A., Naik, G., Peysakhov, M., Regli, W., Shaffer, J., Sultanik, E., Tsang, K., Urbano, L., Usbeck, K., & Warren, J. (2004). Demonstration of the secure wireless agent testbed (swat). In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004 (pp. 1214–1215).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Utku Kose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gochhayat, S.P., Lal, C., Sharma, L. et al. Reliable and secure data transfer in IoT networks. Wireless Netw 26, 5689–5702 (2020). https://doi.org/10.1007/s11276-019-02036-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02036-0

Keywords

Navigation