Skip to main content

An Asymmetric RSA-Based Security Approach for Opportunistic IoT

  • Conference paper
  • First Online:
2nd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018)

Abstract

Internet of things (IoT) is a technical revolution of the internet where users, computing systems, and daily objects having sensing abilities collaborate to provide innovative services in various application domains. Opportunistic internet of things (OppIoT) is an extension of the opportunistic networks that exploits the interactions between the human-based communities and the IoT devices to increase the network connectivity and reliability. In this context, the security and privacy requirements play a crucial role as the collected information is exposed to a wide unknown audience. Traditional secure routing methods cannot be applied to OppIoT systems due to the lack of fixed path between nodes. Hence, an adaptable infrastructure is required to handle the security threats in dynamic OppIoT environment. This chapter proposes a novel security scheme for OppIoT using RSA-based asymmetric cryptography to secure the network and Markov chain to make prediction about a node’s future location and its corresponding delivery probability. Simulation results convey that the suggested approach ensures security of messages and outperforms the traditional protocols. RSASec is superior to LPFR-MC in terms of correct packet delivery by 19%, message delivery probability by 2.33%, number of messages dropped is reduced by 3.9%, and average latency is 6.76% lower than LPFR-MC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  2. B. Guo, D. Zhang, Z. Wang, Z. Yu, X. Zhou, Opportunistic IoT: exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6), 1531–1539 (2013)

    Article  Google Scholar 

  3. D. Airehrour, J. Gutierrez, S.K. Ray, Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)

    Article  Google Scholar 

  4. Y. Zhang, S. Yuanyu, et al., On secure wireless communications for IoT under eaves-dropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)

    Article  Google Scholar 

  5. X.-J. Lin, L. Sun, H. Qu, An efficient RSA-based certificateless public key encryption scheme. Discrete Appl. Math. 241, 39–47 (2018)

    Article  MathSciNet  Google Scholar 

  6. S.K. Dhurandher, S.J. Borah, I. Woungang, A. Bansal, A. Gupta, A location prediction-based routing scheme for opportunistic networks in an IoT scenario, in Proceedings of Elsevier Journal of Parallel and Distributed Computing, 2017

    Google Scholar 

  7. P.L.R. Chze, K.S. Leong, A secure multi-hop routing for IoT communication, in Internet of Things (WF-IoT), 2014 IEEE World Forum on (IEEE, 2014)

    Google Scholar 

  8. X. Anita, J. Martin Leo Manickam, M.A. Bhagyaveni, Two-way acknowledgment-based trust framework for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 952905 (2013)

    Article  Google Scholar 

  9. J. Montavont, D. Roth, T. Nol, Mobile IPv6 in internet of things: analysis, experimentations and optimizations. Ad Hoc Netw. 14, 1525 (2014)

    Article  Google Scholar 

  10. D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Sensor and Ad Hoc Communications and Networks (IEEE, 2004), p. 7180

    Google Scholar 

  11. U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in SECURECOMM, 2005, p. 384396

    Google Scholar 

  12. L.B. Oliveira, M. Scott, J. Lopez, R. Dahab, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, in INSS, 2008, p. 173180

    Google Scholar 

  13. N. Ye, Y. Zhu, R.-C.B. Wang, R. Malekian, Q.-M. Lin, An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 16171624 (2014)

    Article  Google Scholar 

  14. K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, R. Steinmetz, Practical security in P2P-based social networks, in Proceeding of the IEEE 34th Conference Local Computer Networks, 2009, p. 269272

    Google Scholar 

  15. Z. Jia, X. Lin, S.-H. Tan, L. Li, Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905913 (2012)

    Article  Google Scholar 

  16. R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mHealthcare social network. J. Mobile Netw. Appl. 16(6), 683694 (2011)

    Google Scholar 

  17. Y. Ding, X.-W. Zhou, Z.-M. Cheng, W.-L. Zeng, Efficient authentication and key agreement protocol with anonymity for delay tolerant networks. Wireless Pers. Commun. 70(4), 14731485 (2013)

    Google Scholar 

  18. K. El Defrawy, J. Solis, G. Tsudik, Leveraging social contacts for message confidentiality in delay tolerant networks. in Proceedings of the 33rd Annual IEEE International Computer Software Applications Conference, 2009, p. 271279

    Google Scholar 

  19. Y. Gongjun, S. Olariu, M.C. Weigle, Providing location security in vehicular ad hoc networks. IEEE Wireless Commun. 16(6), 4855 (2009)

    Google Scholar 

  20. W. Wang, H. Man, Y. Liu, A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security Commun. Netw. 2(6), 669685 (2009)

    Google Scholar 

  21. L. Qinghua, Z. Sencun, C. Guohong, Routing in socially selfish delay tolerant networks, in Proceeding of the IEEE INFOCOM, 2010, p. 19

    Google Scholar 

  22. L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)

    Article  Google Scholar 

  23. A. Lindgren, A. Doria, D. Schelen, Probabilistic routing in intermittently connected networks, in Proceeding of ACM SIGMOBILE Mobile Comp. Commun., 2003, pp. 19–20

    Google Scholar 

  24. A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceeding of 2nd Intl. Conference on Simulation Tools and Techniques (SIMU-Tools’ 09), Rome, Italy, Mar 2–6, 2009, pp. 1–9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kandhoul, N., Dhurandher, S.K. (2019). An Asymmetric RSA-Based Security Approach for Opportunistic IoT. In: Woungang, I., Dhurandher, S. (eds) 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 27. Springer, Cham. https://doi.org/10.1007/978-3-030-11437-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11437-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11436-7

  • Online ISBN: 978-3-030-11437-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics