Visible to the public Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture

TitleIntelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Publication TypeConference Paper
Year of Publication2017
AuthorsSridhar, S., Smys, S.
Conference Name2017 International Conference on Inventive Systems and Control (ICISC)
KeywordsAsymmetric Encryption, asymmetric key encryption, authentication, cloud services, compositionality, computer network security, cryptographic protocols, cryptography, data privacy, DDoS, distributed denial of service attacks, Encryption, End-To-End devices, end-to-end security architecture, Human Behavior, Intelligent security framework, intelligent service, Internet of Thing, Internet of Things, internetworking, iot devices cryptography, IoT security, IoT service gateway, lattice-based cryptography, light weight asymmetric cryptography, Logic gates, low power sensor nodes, Metrics, network attacks, Protocols, pubcrawl, Public key, public key cryptography, quantum attack, resilience, Resiliency, security issues, security of data, Sensors, session key, symmetric encryption, wireless sensors

Internet of Thing (IoT) provide services by linking the different platform devices. They have the limitation in providing intelligent service. The IoT devices are heterogeneous which includes wireless sensors to less resource constrained devices. These devices are prone to hardware/software and network attacks. If not properly secured, it may lead to security issues like privacy and confidentiality. To resolve the above problem, an Intelligent Security Framework for IoT Devices is proposed in this paper. The proposed method is made up of (1) the light weight Asymmetric cryptography for securing the End-To-End devices which protects the IoT service gateway and the low power sensor nodes and (2) implements Lattice-based cryptography for securing the Broker devices/Gateway and the cloud services. The proposed architecture implements Asymmetric Key Encryption to share session key between the nodes and then uses this session key for message transfer This protects the system from Distributed Denial of Service Attacks, eavesdropping and Quantum algorithm attacks. The proposed protocol uses the unique Device ID of the sensors to generate key pair to establish mutual authentication between Devices and Services. Finally, the Mutual authentication mechanism is implemented in the gateway.

Citation Keysridhar_intelligent_2017