Next Article in Journal
Implementation of Analog Perceptron as an Essential Element of Configurable Neural Networks
Next Article in Special Issue
An Edge Based Multi-Agent Auto Communication Method for Traffic Light Control
Previous Article in Journal
Deep Learning Sensor Fusion for Autonomous Vehicle Perception and Localization: A Review
Previous Article in Special Issue
Towards Attention-Based Convolutional Long Short-Term Memory for Travel Time Prediction of Bus Journeys
Article

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things

1
National University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science, Islamabad 44000, Pakistan
2
Department of Electrical and Computer Engineering, California State University, Chico, CA 90802, USA
3
National University of Sciences and Technology (NUST), School of Mechanical and Manufacturing Engineering, Islamabad 44000, Pakistan
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(15), 4221; https://doi.org/10.3390/s20154221
Received: 30 June 2020 / Revised: 24 July 2020 / Accepted: 25 July 2020 / Published: 29 July 2020
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. View Full-Text
Keywords: information-theoretic security; multipath routing; Internet of things information-theoretic security; multipath routing; Internet of things
Show Figures

Figure 1

MDPI and ACS Style

Rauf, A.; Wang, Z.; Sajid, H.; Ali Tahir, M. Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things. Sensors 2020, 20, 4221. https://doi.org/10.3390/s20154221

AMA Style

Rauf A, Wang Z, Sajid H, Ali Tahir M. Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things. Sensors. 2020; 20(15):4221. https://doi.org/10.3390/s20154221

Chicago/Turabian Style

Rauf, Abid, Zhaohong Wang, Hasan Sajid, and Muhammad Ali Tahir. 2020. "Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things" Sensors 20, no. 15: 4221. https://doi.org/10.3390/s20154221

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop