Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Title | Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kurera, C., Navoda, D. |
Conference Name | 2018 18th International Conference on Advances in ICT for Emerging Regions (ICTer) |
Keywords | authentication, authorisation, computer network security, cryptographic protocols, data communication, decryption, Encryption, Human Behavior, Internet, Internet of Things, IoT, IoT devices exchange data, Kerberos, local networks, low-power devices, low-power IoT devices, message authentication, Metrics, Node to node data transmission, node-to-node secure data transmission protocol, Protocols, pubcrawl, public key cryptography, Resiliency, secure data transmission, Symmetric Key Cryptography, transmission protocol |
Abstract | Through the internet and local networks, IoT devices exchange data. Most of the IoT devices are low-power devices, meaning that they are designed to use less electric power. To secure data transmission, it is required to encrypt the messages. Encryption and decryption of messages are computationally expensive activities, thus require considerable amount of processing and memory power which is not affordable to low-power IoT devices. Therefore, not all secure transmission protocols are low-power IoT devices friendly. This study proposes a secure data transmission protocol for low-power IoT devices. The design inherits some features in Kerberos and onetime password concepts. The protocol is designed for devices which are connected to each other, as in a fully connected network topology. The protocol uses symmetric key cryptography under the assumption of that the device specific keys are never being transmitted over the network. It resists DoS, message replay and Man-of-the-middle attacks while facilitating the key security concepts such as Authenticity, Confidentiality and Integrity. The designed protocol uses less number of encryption/decryption cycles and maintain session based strong authentication to facilitate secure data transmission among nodes. |
URL | https://ieeexplore.ieee.org/document/8615511 |
DOI | 10.1109/ICTER.2018.8615511 |
Citation Key | kurera_node–node_2018 |
- local networks
- transmission protocol
- Symmetric Key Cryptography
- secure data transmission
- Resiliency
- public key cryptography
- pubcrawl
- Protocols
- node-to-node secure data transmission protocol
- Node to node data transmission
- Metrics
- message authentication
- low-power IoT devices
- low-power devices
- authentication
- Kerberos
- IoT devices exchange data
- IoT
- Internet of Things
- internet
- Human behavior
- encryption
- decryption
- data communication
- Cryptographic Protocols
- computer network security
- authorisation