Visible to the public Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices

TitleNode-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Publication TypeConference Paper
Year of Publication2018
AuthorsKurera, C., Navoda, D.
Conference Name2018 18th International Conference on Advances in ICT for Emerging Regions (ICTer)
Keywordsauthentication, authorisation, computer network security, cryptographic protocols, data communication, decryption, Encryption, Human Behavior, Internet, Internet of Things, IoT, IoT devices exchange data, Kerberos, local networks, low-power devices, low-power IoT devices, message authentication, Metrics, Node to node data transmission, node-to-node secure data transmission protocol, Protocols, pubcrawl, public key cryptography, Resiliency, secure data transmission, Symmetric Key Cryptography, transmission protocol
Abstract

Through the internet and local networks, IoT devices exchange data. Most of the IoT devices are low-power devices, meaning that they are designed to use less electric power. To secure data transmission, it is required to encrypt the messages. Encryption and decryption of messages are computationally expensive activities, thus require considerable amount of processing and memory power which is not affordable to low-power IoT devices. Therefore, not all secure transmission protocols are low-power IoT devices friendly. This study proposes a secure data transmission protocol for low-power IoT devices. The design inherits some features in Kerberos and onetime password concepts. The protocol is designed for devices which are connected to each other, as in a fully connected network topology. The protocol uses symmetric key cryptography under the assumption of that the device specific keys are never being transmitted over the network. It resists DoS, message replay and Man-of-the-middle attacks while facilitating the key security concepts such as Authenticity, Confidentiality and Integrity. The designed protocol uses less number of encryption/decryption cycles and maintain session based strong authentication to facilitate secure data transmission among nodes.

URLhttps://ieeexplore.ieee.org/document/8615511
DOI10.1109/ICTER.2018.8615511
Citation Keykurera_node–node_2018