ISSN: 2375-2998
International Journal of Electrical and Electronic Science  
Manuscript Information
 
 
An Embedded Security Center for Internet of Things (IoT) Infrastructure
International Journal of Electrical and Electronic Science
Vol.4 , No. 2, Publication Date: Aug. 8, 2017, Page: 16-28
471 Views Since August 8, 2017, 431 Downloads Since Aug. 8, 2017
 
 
Authors
 
[1]    

Qutaiba Ibrahim Ali, Computer Engineering Department, College of Engineering, Mosul University, Mosul, Iraq.

 
Abstract
 

Internet of Things (IoT) is a promising technology which has been widely used in different application fields such as warehouses, Smart Grids, public security, intelligent buildings and so on, following the progress in sensors, wireless communication and embedded systems. IOT gateway plays a significant responsibility in IoT as it can be considered as the bridge between sensor network and traditional communication network with their Internet applications. This paper gives an insight view to the design and realization challenges to localize an embedded security center into the IoT gateway nodes which connects Wireless Sensor Networks (WSN) to the Internet. The main goal is to protect the data of IoT gateway (needed for its operation) as well as its functionality and accessibility. The suggested embedded security center must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable, the source is who he claims to and the system is robust and available. The proposed gateway security center consists of two ciphering methods (Advanced Encryption Standards (AES) & Rivest Cipher 4 (RC4)) to provide data encryption to the whole path from the WSN nodes to the server, a Hashed Message Authentication Code (HMAC) function to provide message integrity and authentication between the gateway and the server, a keys generation module, bidirectional entity authentication and an embedded Intrusion Detection System (IDS) to defend against internet attacks. The proposed defense strategies took into account the embedded nature of a IoT gateway and hence the recommended solutions make a compromise between highly secured and good performed system.


Keywords
 

Internet of Things Gateway, Wireless Sensor Network Security, Intrusion Detection System, Network Processor


Reference
 
[01]    

A. Castellani, " Architecture and Protocols for the Internet of Things: A Case Study", In Proceedings of First International Workshop on the Web of Things (WoT), 2010.

[02]    

Z. Shelby, "Embedded Web Services", IEEE Wireless Communications, pp. 52-57, December 2010.

[03]    

L. Atzori, "The Internet of Things: A survey", Computer Networks Journal, Vol. 4, No. 5, pp. 2787-2805, October 2010.

[04]    

C. P. Mayer, "Security and Privacy Challenges in the Internet of Things", KiVS Workshop on Global Sensor Network, 2009.

[05]    

R. Roman, J. Lopez, "Integrating Wireless Sensor Networks and the Internet: a Security Analysis", Internet Research Journal, Vol. 19, no. 2, pp. 246-259, 2009.

[06]    

A. Modirkhazeni, N. Ithnin and Q. Ibrahim, “Empirical Study on Secure Routing Protocols in Wireless Sensor Networks,” International Journal of Advancements in Computing Technology, Vol. 2, No. 5, 2010, pp. 25-41.

[07]    

K. Zhang, C. Wang, and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), 2008, pp. 1-5.

[08]    

T. Lalitha and R. Umarani, “Energy efficient Cluster Based Key Management Technique for Wireless Sensor Network,” International Journal of Advances in Engineering & Technology (IJAET), Vol. 3 No. 1, 2012, pp. 186-190.

[09]    

S. Sharma and S. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” In Proceedings of International Conference on Communication, Computing (ICCCS’11), 2011, pp. 146-151.

[10]    

R. Doriguzzi, G. Russello, and E. Salvadori, “Tinykey: A light-weight architecture for wireless sensor networks securing real-world applications,” in Wireless On-Demand Network Systems and Services (WONS) International Conference, 2011.

[11]    

L. Casado and P. Tsigas, “Contikisec: A secure network layer for wireless sensor networks under the contiki operating system,” in Proceedings of the 14th Nordic Conference on Secure IT Systems, Berlin, 2009.

[12]    

F. Büsching, U. Kulau and L. Wolf, “Architecture and Evaluation of INGA - An Inexpensive Node for General Applications,” in IEEE Sensors Conference, Taiwan, 2012, pp. 842-845.

[13]    

Q. Ali, N. Najim, “Security for Wireless Sensor Network”, Global Journal of Engineering Science and Researches, Vol. 1, No. 3, 2014.

[14]    

I. Gawdan, C. Chow, T. Zia, Q. Sarhan, “A Novel Secure Key Management for Hierarchical Wireless Sensor Networks,” In Proceeding of 2011 Third Conference on Computational Intelligence, Modeling and Simulation (CIMSiM), 2011, pp. 312-316.

[15]    

F. Kausar, F. Masood and S. Hussain, “An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks,” In Advances in Communication Systems and Electrical Engineering, Lecture Notes in Electrical Engineering, Vol. 4, No. 2, 2008, pp. 85-98.

[16]    

B. Vaidya, J. Rodrigues, J. Park, "User authentication schemes with pseudonymity for ubiquitous sensor network", in NGN. Int. J. Commun. Syst. 2010, Vol. 23, No 1, pp 1201-1222.

[17]    

M. Das, "Two-factor user authentication in wireless sensor networks", IEEE Trans. Wireless Comm. 2009, vol. 8, No. 2, pp 1086-1090.

[18]    

D. He, Y. Gao, S. Chan, C. Chen, J. Bu, “An enhanced two-factor user authentication scheme in wireless sensor networks”, Int. J. Ad-Hoc Sensor Wireless Network., Vol. 2, No. 3, 2010, pp 1-11.

[19]    

A. Giannetsos, “Intrusion Detection in Wireless Sensor Networks”, Master thesis, Mellon University, April 8, 2008.

[20]    

V. C. Manju., “Study of Security Issues in Wireless Sensor Network”, International Journal of Engineering Science and Technology (IJEST), Vol. 3, No. 10, October 2011.

[21]    

S. Hichem, F. Mohamed, “Novel Hybrid Intrusion Detection System for Clustered Wireless Sensor Network”, International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 4, July 2011.

[22]    

S. Andriy, F. Lukas, M. Vaclav, “Neighbor-Based Intrusion Detection for Wireless Sensor Networks”, Faculty of Informatics Masaryk University (FI MU), Report Series FIMU, FIMU May 2010.

[23]    

Q. Ali, S. Lazim, "Design and Implementation of an Embedded Intrusion Detection System (IDS) for Wireless Applications", IET Information Security Journal, Vol. 6, Issue 3, 2012.

[24]    

Q. Ali, S. Lazim, E. Fathi, “Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems”, IJEEE Journal, Vol. 8 No. 1, 2012.

[25]    

Z. Handong, L. Zhu, "Internet of Things: Key technology, architecture and challenging problems", 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), vol. 4, no. 4, pp. 507, 512, 10-12 June 2011.

[26]    

I. Gronbaek, "Architecture for the Internet of Things (IoT): API and Interconnect”, SENSORCOMM '08. Second International Conference on Sensor Technologies and Applications, pp. 802, 807, 25-31 Aug. 2008.

[27]    

H. Chen; X. Jia; H. Li, "A brief introduction to IoT gateway", IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610, 613, 14-16 Oct. 2011.

[28]    

Q. Zhu; R. Wang, Q. Chen, Y. Liu; W. Qin, "IOT Gateway: Bridging Wireless Sensor Networks into Internet of Things," 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347, 352, 11-13 Dec. 2010.

[29]    

L. Costantino, N. Buonaccorsi, C. Cicconetti, R. Mambrini, "Performance analysis of an LTE gateway for the IoT," 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1, 6, 25-28 June 2012.

[30]    

Q. Ali: ‘Event driven duty cycling: an efficient power management scheme for a solar-energy harvested road side unit, IET Electrical Systems in Transportation, 2016, Available online at: www.ietdl.org, 2016.

[31]    

Q. Ali: ‘Enhanced power management scheme for embedded road side units’, IET Computers & Digital Techniques, 2016, 10 (4), pp. 174-185.

[32]    

Q. Ali, Realization of a Self Powered Road Side Unit Using Network Processor Technology, Recent Patents on Computer Science, 2017, Vol. 10, No. 4.

[33]    

MXE-200i, Fanless Embedded Computer-IoT Gateway, ADLINK Technology, Available at: www.adlinktech.com.

[34]    

NIO 100, Intel® Quark Processor X1021 IoT Gateway System, available at: www.nexcom.com.

[35]    

DKxxxIoT Gateway Series, Available at: www.Intel.com/iotgateways.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership