A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks

2014 ◽  
Vol 8 (4) ◽  
pp. 62-102 ◽  
Author(s):  
Piotr Książak ◽  
William Farrelly ◽  
Kevin Curran

The number of Resource-Limited Wireless Devices utilized in many areas of IT is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by the majority of ubiquitous computing devices, thus there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources. A security framework is presented here that combines aspects of the Gossamer protocol and the Scalable Encryption Algorithm (SEA) to provide an implementation of inter-device security. The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol. Our system performed well with the code space requirements smaller than 600 bytes (excluding shared libraries) and a performance of 27 milliseconds per one 96-bit block of data.

Author(s):  
Piotr Ksiazak ◽  
William Farrelly ◽  
Kevin Curran

In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by most ubiquitous computing devices; thus, there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources. The analysis of the lightweight solutions is divided into lightweight authentication protocols and lightweight encryption algorithms. The authors present a prototype running on the nRF9E5 microcontroller that provides necessary authentication and encryption on resource-limited devices.


Author(s):  
RASHI VOHRA ◽  
BRAJESH PATEL

The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications. Many chaotic cryptosystem has been developed, as a result of the interesting relationship between the two field chaos and cryptography phenomenological behavior. In this paper, an overview of cryptography, optimization algorithm and chaos theory is provided and a novel approach for encryption and decryption based on chaos and optimization algorithms is discussed. In this article, the basic idea is to encrypt and decrypt the information using the concept of genetic algorithm with the pseudorandom sequence further used as a key in genetic algorithm operation for encryption: which is generated by application of chaotic map. This attempt result in good desirable cryptographic properties as a change in key will produce undesired result in receiver side. The suggested approach complements standard, algorithmic procedures, providing security solutions with novel features.


Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Ncamiso Nkululeko Jahalenkhosi Dlamini ◽  
Prabhakar Rontala Subramaniam

Bring your own device (BYOD) has infiltrated the work environment and businesses are enjoying the benefits coupled with the adoption of the trend. At the same time, the adoption of BYOD has introduced a number of security threats that businesses are failing to match. In the pursuit of addressing security threats that are introduced by the adoption of this technology trend, this chapter recommends a three-dimensional (3-D) security framework that can be used to mitigate the risks emanating from a BYOD enabled environment. Data was collected from the employees of two banks in Africa that supported BYOD trend to measure individual and organizational practices. This chapter investigates further on these practices in addressing implications of BYOD. Three categories of security threats are delineated in this chapter. A review of existing security frameworks is presented in this chapter. The chapter concludes by outlining a 3-D security framework as a potential solution to protect BYOD enabled business environment.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Qian Lu ◽  
Haipeng Qu ◽  
Yuzhan Ouyang ◽  
Jiahui Zhang

In general, the IEEE 802.11 network identifiers used by wireless access points (APs) can be easily spoofed. Accordingly, a malicious adversary is able to clone the identity information of a legitimate AP (LAP) to launch evil twin attacks (ETAs). The evil twin is a class of rogue access point (RAP) that masquerades as a LAP and allures Wi-Fi victims’ traffic. It enables an attacker with little effort and expenditure to eavesdrop or manipulate wireless communications. Due to the characteristics of strong concealment, high confusion, great harmfulness, and easy implementation, the ETA has become one of the most severe security threats in Wireless Local Area Networks (WLANs). Here, we propose a novel client-side approach, Speical Length Frames Arrival Time (SLFAT), to detect the ETA, which utilizes the same gateway as the LAP. By monitoring the traffic emitted by target APs at a detection node, SLFAT extracts the arrival time of the special frames with the same length to determine the evil twin’s forwarding behavior. SLFAT is passive, lightweight, efficient, hard to be escaped. It allows users to independently detect ETA on ordinary wireless devices. Through implementation and evaluation in our study, SLFAT achieves a very high detection rate in distinguishing evil twins from LAPs.


Author(s):  
Fadele Ayotunde Alaba ◽  
◽  
Abayomi Jegede ◽  
Christopher Ifeanyi Eke ◽  
◽  
...  

The Internet of Things (IoT) expects to improve human lives with the rapid development of resource-constrained devices and with the increased connectivity of physical embedded devices that make use of current Internet infrastructure to communicate. The major challenging in such an interconnected world of resource-constrained devices and sensors are security and privacy features. IoT is demand new approaches to security like a secure lightweight authentication technique, scalable approaches to continuous monitoring and threat mitigation, and new ways of detecting and blocking active threats. This paper presents the proposed security framework for IoT network. A detail understanding of the existing solutions leads to the development of security framework for IoT network. The framework was developed using cost effective design approach. Two components are used in developing the protocol. The components are Capability Design (mainly a ticket, token or key that provides authorization to access a device) and Advanced Encryption Standard (AES)-Galois Counter Mode (GCM) (a-security protocol for constrained IoT devices). AES-GCM is an encryption process that is based on authentication and well suitable IoT.


2020 ◽  
Vol 37 (1) ◽  
Author(s):  
Awino Okech

This paper focuses on contemporary challenges to the human security framework through an examination of asymmetrical conflict generated by extremist insurgents, specifically Al Shabaab in Kenya. The political and security dynamics generated by extremist groups often find reinforcement in local contestations over power and territory, resulting in an interaction between local and 'external'. It is the product of these interactions in the form of opportunities, resultant discourses, responses and what they offer to an expansion of normative ideas about human security and conflict that this paper focuses on. Using Kenya as a case study, this paper explores the interface between the growth of Al Shabaab, securitisation of governance and political elite consensus on the policy relationship between human security versus a state security model. This paper pursues the argument that the rise in the intensity and nature of Al Shabaab attacks in Kenya has influenced the interpretation of the country's security  threats and the application of strategies. Rather than aiding the application of human security as central to national security, it has rolled back previous gains.


2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Muhammad Mostafa Monowar ◽  
Mohammed Basheri

The rapid proliferation of low-power wireless devices enables the industrial users to improve the productivity and safety of the plants as well as efficient management of the system. This can be achieved through significant increase in data collection, remote monitoring, and control of the plants and promoting the development of industrial Internet of Things (IoT) applications. However, the industrial environment is typically harsh causing high link quality variations and topology changes. The wireless devices used in this environment are also resource constrained in terms of energy, memory, and processing power. In spite of their low-power and lossy nature, these networks demand provisioning of differentiated services for various industrial applications having diverse quality of service (QoS) requirements. Considering the unique characteristics of low-power and lossy networks (LLN), routing for low-power and lossy networks (RPL) is devised which was standardized by IETF in 2012. To meet the demand of diverse traffic, RPL supports multiple instances in a single network. This paper proposes MI-RPL, a multi-instance solution of RPL for industrial low-power and lossy networks (LLNs). MI-RPL defines four instances for four distinct traffic classes of industrial monitoring applications in terms of delay and reliability. MI-RPL also introduces composite routing metrics and proposes an objective function (OF) to compute the most suitable path for each instance. The performance of MI-RPL is investigated through simulations that exhibit MI-RPL has better delay and packet delivery performance for delay- and reliability-constrained traffic along with lower energy consumption compared to the standard RPL.


Author(s):  
Raja Al-Jaljouli ◽  
Jemal H. Abawajy

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.


Author(s):  
Tapio Levä ◽  
Mahya Ilaghi ◽  
Vilen Looga ◽  
Miika Komu ◽  
Nicklas Beijar ◽  
...  

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodological framework. Based on eleven expert interviews complemented with a literature survey, the paper identifies potential deployment challenges for CoAP, both technical and business-related, and suggests approaches to overcome them. The findings should facilitate the uptake of CoAP by supporting the potential adopters of the protocol in their decision-making.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6566
Author(s):  
Essia Hamouda

Overloaded network devices are becoming an increasing problem especially in resource limited networks with the continuous and rapid increase of wireless devices and the huge volume of data generated. Admission and routing control policy at a network device can be used to balance the goals of maximizing throughput and ensuring sufficient resources for high priority flows. In this paper we formulate the admission and routing control problem of two types of flows where one has a higher priority than the other as a Markov decision problem. We characterize the optimal admission and routing policy, and show that it is a state-dependent threshold type policy. Furthermore, we conduct extensive numerical experiments to gain more insight into the behavior of the optimal policy under different systems’ parameters. While dynamic programming can be used to solve such problems, the large size of the state space makes it untractable and too resource intensive to run on wireless devices. Therefore, we propose a fast heuristic that exploits the structure of the optimal policy. We empirically show that the heuristic performs very well with an average reward deviation of 1.4% from the optimal while being orders of magnitude faster than the optimal policy. We further generalize the heuristic for the general case of a system with n (n>2) types of flows.


Sign in / Sign up

Export Citation Format

Share Document