Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture

https://doi.org/10.1016/j.micpro.2020.103216Get rights and content

Abstract

In recent times, Internet connected technologies and applications have seen tremendous growth as everyone is inclined to enjoy the benefits offered by them. An upcoming technology called Internet of Things (IoT) has increased the capacity of internet to take in numerous computing devices. With respect to the prevailing IP-based Security Protocol (SecP) suites, which rely on the conventions of Network Topology (NT) and device and network (n/w) abilities to decide on the designs of the employed Security Mechanisms (SecM). In this work, we address by putting forth a unified IoT framework model dependent on the Mobile Security IP IoT Architecture (MSIP-IoT-A) which exclusively concentrates on supporting Sec for the IoT. The model suggested by us, brings together local IoT systems with the global Internet with no loss in its usage, ability of cross operation and protecting the Sec. An Internet of Things (IOT) – Name Determination Check (NDC) is proposed as the main part of the middleware layer by us in this article and we also generate a We propose an IoT-NDC as a core component of the, and develop a not so heavy but light keying protocol capable of establishing a trust amid an IoT device and the IoT-NDC. Moreover, we attempt of identify and fix this issue by suggesting a peer-to-peer SecP for fulfilling a range of environment. We have applied safe communication (comm.) upon an open sourced platform for the IoT. Ultimately, with assessment and studies with the help of models and data from the SecPlogic, we conclude that the suggested methodology is effective to fulfill the mentioned objective and can be used for the platform.

Introduction

The idea behind the concept of “Internet of Things” [1] is the prospectus of linking the formerly unlinked devices and the presently separated networks to the current internet facilities. Latest attempts done at the IETF and concerned standardization bodies focus on creating IPv6 ready for the embedded, n/w devices and other related/ws. All these are partially run based on the objective of getting a uniform interconnection between IoT n/ws amid them and also with the Internet domain. Presently, IoT based applications are available in almost all the domains and are forming a major part in our day-to-day life (e.g., healthcare, home automation, environmental monitoring, infrastructure management and transportation), leading to the tremendous growth in the IoT systems. As per the Federal Trade Commission (FTC) [2], the IoT devices count has exceeded the user population at work and the wireless device count that are linked to the IoT would exceed 30 billion around 220 and will surpass hub devices (smart phones, tablets and PCs).

Hence, it is not the usual IP Sec resolutions that satisfy the needs of domains, so, they will not offer themselves to form safe comm. amid the IoT domains and the Internet. The prime focus is to safeguard and assure the reliability of the Msg. Nevertheless, however strong the surveying device is, or if one can secure their privacy, it is yet good compared to others .But, the basic discrepancies amid the IoT and the Internet domain avoid a sudden implementation of prevailing IP-based protocols in a theoretical view. Here, the on NT and also the device and its n/w capacities. Taking into account the Sec and privacy choice of designs with respect to the working SecM is usually done based on the presumptions matters, the fundamental objective would be to assure the reliability and validation of the Msgs, Thereby people or devices would be able to trust the info they get and be assured that the info is not altered.

In order to fix these issues, fresh ideas on IoT that use clear slate imminent internet systems like MSIP-IoT-Aare suggested .but, there is a key obstacle in IoT is Sec and privacy. In order to reach the reliability target, standard cryptographic (CRYPTO) [3] methods are important and also act as essential means. We need to make sure that the best CRYPTO method has been chosen to assure the Sec of the system, since, mismatching methods may lead to leakage of important data. We should also take into account the areas of application and also it is not so easy to get a resolution applicable to all. Particularly, in certain IoT applications, sensors act as vital parts and they are unable to apply complicated Sec methodologies. Hence, the methodology has to be pliable and be practical to settle with various conditions.

In order to enhance IoT Sec, our work analysis on the process of integrating the IoT with internet in a safe way and also it offers various huge inputs like [4]:

  • We put forth a universal IoT setup which is according to the imminent model focusing on a latest constituent, called IoT middleware, that combines local IoT system with the universal internet;

  • We analyze the weaknesses of the current IoT systems and offer Sec methods to safeguard from attacks and misuses via our universal IoT explanations. Remarkably, we suggest a safe name solution architecture at the IoT middleware for enabling seamless name translation and services and also enable Sec;

  • Finally, we suggest a propose an allocation type three-party key management methodology for creating alike keys inside the local IoT systems for safe functioning, that finishes the final part of key management for the complete IoT framework and so it allows Sec coverage from local IoT systems to the universal imminent Internet.

The article is set in the following manner: Section 1, we analyze the prevailing IoT solutions in Section 2 and study their Sec and privacy threats in Section 3. Later, in Section 4, we offer a framework for an IoT platform according to a demonstrative MSIP-IoT-A. Particularly, we bring in an IoT middleware for handling IoT devices and data in Section 5. According to our Sec and privacy studies, test against Sec are suggested for safeguarding counter to those tests. Especially, to manage the capacity limits of low end IoT devices, we formula tea main provisioning methodology for enabling safe communication in local IoT systems in Section 6. In Section 7 presented the conclusion and future extension work of this paper.

Section snippets

Related works

Since there are numerous irregular attentions in IoT, there have been several standardization procedures for the methodologies. This has lead to the publication of several review or survey articles on this topic for highlighting various perceptions of the regulations with respect to IoT. Few such works like survey of IETF standards, security protocols, and application, or transport and layer standards. Most works debate on the particular layer of regulations like interaction methodologies or

Outline infrastructure of the MSIP-IoT-A

MSIP-IoT-A is an imminent Internet framework focusing to offer basic answers for the hurdles prevailing in the existing internet. The basic framework targets running MSIP-IoT-A are flexibility and honesty, the biggest pattern of the Internet. For achieving such targets, MSIP-IoT-A disrupts focused particular framework goals, that also contains continuous host and mobility, not a lone root of trust, planned data receipt, relative strength, ability to fix the need and change. Such framework

An improvement of proposed IoT aided secp

To stay away from the yielded Sec problems while linking IoT n/ws to the Internet, here we claim that an adjustment layer for IP SecP is essential [17]. This layer is based on idea like the 6 Low PAN adjustment layer for IPv6 by permitting for domain-specific protocol variants. Besides, gateways linking various zones are able to translate amid standard IP Sec protocol and its domain-specific protocol variants.

In its preliminary form, the adjustment tier has a Sec unburdening its function sat

SecP

SecP is the principal concept of the P2P Sec system [19]. All systems interactions and verification are based on this method. The reason and architecture of the system and assessed by it. The framework and ides of this method exclusively concentrates on high Sec, better proficiency and cost effective.

Results and discussion

Here the evaluation of the safe comm. is explained according to its effectiveness. The core point being that the SecP would be introduced here.

Conclusion and future work

Our article explains on the outlines of the variances amid the IoT and the Internet generated fresh assaults on IoT hosts which are not alleviated by using current IP Sec remedies. Later, we suggest a universal IoT framework structure on the basis on the MSIP-IoT-A that looks into the issues in Sec and improves the trust on the working of IoT. Our framework referred as IoT middleware links different hardware in IoT systems with the global MSIP-IoT-A. The requirements of this process are met via

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Declaration of Competing Interest

This paper has not communicated anywhere till this moment, now only it is communicated to your esteemed journal for the publication with the knowledge of all co-authors.

Dr. V. Vijaya Kumar was born in Salem, Tamilnadu. He obtained his Bachelor's degree in Electrical and Electronics Engineering from Anna University, Chennai. Then he obtained his Master's degree in Computer Science and Engineering from Anna University, Tamilnadu, India, He has held the position of associate professor in AVS Engineering College, Salem. And He has been awarded Ph.D., for his Research work in the area of Wireless Network Security. He is life member of ISTE Indian society for

References (26)

  • Min Wang

    On the security of peer-to-peer computing based on SPKI/SDSI

  • H. Suo et al.

    Security in the internet of things: a review

  • D. Giusto et al.

    The Internet of Things

    (2010)
  • Cited by (0)

    Dr. V. Vijaya Kumar was born in Salem, Tamilnadu. He obtained his Bachelor's degree in Electrical and Electronics Engineering from Anna University, Chennai. Then he obtained his Master's degree in Computer Science and Engineering from Anna University, Tamilnadu, India, He has held the position of associate professor in AVS Engineering College, Salem. And He has been awarded Ph.D., for his Research work in the area of Wireless Network Security. He is life member of ISTE Indian society for Technical Education (ISTE). He published 4 journals in (Annexure - I) and 3 journals in (Annexure- II) and he participated more than 10 national and international conference.

    Dr. Devi received her Ph.D degree from Anna University, Chennai in the field of Computer Applications. She has been worked from lecturer to associate professor since 2003 in India and abroad. Presently she is working as an assistant professor / Computer Science department at King Khalid University, Kingdom of Saudi Arabia. She is a reviewer for SCI indexed International Journals are “Elsevier - Computer Communications, Transactions on Services Computing”. She has published more than twenty research articles in journals/conferences also she published 1 book and two Springer lecture notes. Her areas of interest in Teaching, Learning & Research are: Wireless Communications | MANETs | Software Engineering | Artificial Intelligence | Internet of Things | Machine Learning | Soft Computing: Neural Network, Fuzzy & Optimization | Programming and Data Structures. She became a Member of ISTE since 2011.

    Dr. P. Vishnu Raja M.E., P.hD., is working as assistant professor(senior) in the Dept of computer science and engineering from 2007 at Kongu engineering college with a total teaching experience of 15 years. His area of interest is Data mining and Machine Learning Algorithms. He has published 17 papers in international journals and 10 papers in international conferences. He has conducted more than 10 workshops on the topics like Latex, Joomla and Data Mining.

    Dr. P. Kanmani, assistant professor in Department of Computer Science and Engineering K.S.Rangasamy College of Technology, Tamilnadu. She has completed her Doctorate in the area of Machine Learning. She is associated with Lichen Image Identification portal funded by Science and Engineering Research board by DST government of India. She has published 26 technical papers in international, national journals and conference proceedings. Her areas of research include Image processing, Data analytics and machine learning

    Dr. Priya. V received her Ph.D. degree Information and Communication Engineering in 2017 at Anna University. Currently she is working as an assistant professor in Computer Science and Engineering at Mahendra Institute of Technology. Her research interests are in the areas of Cloud computing, Image processing, Data science and Deep Learning. She published her research articles in reputed international journals which is having high impact factor.

    Dr. S. Sudhakar received his PhD degree in ICE from Anna University, Chennai, Tamil Nadu, and India. He has 20 years of Experience in Teaching / Research / Industry. He has published papers in 50 International Journals, 20 International Conferences and 10 National Conferences. His research interest includes Network Security, Information Security and MANET, Cloud Computing, IoT. He is a member of various professional bodies like MISTE, MIEEE, MIAENG, MIACSIT, MICST, and MIEDRC.

    Dr. Sujatha Krishnamoorthy is working as an assistant professor in Department of Computer Science Kean Wenzhou University China and active member of CSI with 16 years of teaching experience. Her specialization is Digital image processing with Image fusion. She has published over 60 papers in International refereed journals like Springer and Elsevier. She has delivered several guest lectures, seminars and chaired a session for various Conferences. She is serving as a Reviewer and Editorial Board Member of many reputed Journals and acted as Session chair and Technical Program Committee member of National conferences and International Conferences. She has received a best researcher award during her research period.

    View full text