Abstract
Internet of things (IoT) is a technical revolution of the internet where users, computing systems, and daily objects having sensing abilities collaborate to provide innovative services in various application domains. Opportunistic internet of things (OppIoT) is an extension of the opportunistic networks that exploits the interactions between the human-based communities and the IoT devices to increase the network connectivity and reliability. In this context, the security and privacy requirements play a crucial role as the collected information is exposed to a wide unknown audience. Traditional secure routing methods cannot be applied to OppIoT systems due to the lack of fixed path between nodes. Hence, an adaptable infrastructure is required to handle the security threats in dynamic OppIoT environment. This chapter proposes a novel security scheme for OppIoT using RSA-based asymmetric cryptography to secure the network and Markov chain to make prediction about a node’s future location and its corresponding delivery probability. Simulation results convey that the suggested approach ensures security of messages and outperforms the traditional protocols. RSASec is superior to LPFR-MC in terms of correct packet delivery by 19%, message delivery probability by 2.33%, number of messages dropped is reduced by 3.9%, and average latency is 6.76% lower than LPFR-MC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
B. Guo, D. Zhang, Z. Wang, Z. Yu, X. Zhou, Opportunistic IoT: exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6), 1531–1539 (2013)
D. Airehrour, J. Gutierrez, S.K. Ray, Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)
Y. Zhang, S. Yuanyu, et al., On secure wireless communications for IoT under eaves-dropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)
X.-J. Lin, L. Sun, H. Qu, An efficient RSA-based certificateless public key encryption scheme. Discrete Appl. Math. 241, 39–47 (2018)
S.K. Dhurandher, S.J. Borah, I. Woungang, A. Bansal, A. Gupta, A location prediction-based routing scheme for opportunistic networks in an IoT scenario, in Proceedings of Elsevier Journal of Parallel and Distributed Computing, 2017
P.L.R. Chze, K.S. Leong, A secure multi-hop routing for IoT communication, in Internet of Things (WF-IoT), 2014 IEEE World Forum on (IEEE, 2014)
X. Anita, J. Martin Leo Manickam, M.A. Bhagyaveni, Two-way acknowledgment-based trust framework for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 952905 (2013)
J. Montavont, D. Roth, T. Nol, Mobile IPv6 in internet of things: analysis, experimentations and optimizations. Ad Hoc Netw. 14, 1525 (2014)
D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Sensor and Ad Hoc Communications and Networks (IEEE, 2004), p. 7180
U. Hengartner, P. Steenkiste, Exploiting hierarchical identity-based encryption for access control to pervasive computing information, in SECURECOMM, 2005, p. 384396
L.B. Oliveira, M. Scott, J. Lopez, R. Dahab, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, in INSS, 2008, p. 173180
N. Ye, Y. Zhu, R.-C.B. Wang, R. Malekian, Q.-M. Lin, An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 16171624 (2014)
K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, R. Steinmetz, Practical security in P2P-based social networks, in Proceeding of the IEEE 34th Conference Local Computer Networks, 2009, p. 269272
Z. Jia, X. Lin, S.-H. Tan, L. Li, Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905913 (2012)
R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mHealthcare social network. J. Mobile Netw. Appl. 16(6), 683694 (2011)
Y. Ding, X.-W. Zhou, Z.-M. Cheng, W.-L. Zeng, Efficient authentication and key agreement protocol with anonymity for delay tolerant networks. Wireless Pers. Commun. 70(4), 14731485 (2013)
K. El Defrawy, J. Solis, G. Tsudik, Leveraging social contacts for message confidentiality in delay tolerant networks. in Proceedings of the 33rd Annual IEEE International Computer Software Applications Conference, 2009, p. 271279
Y. Gongjun, S. Olariu, M.C. Weigle, Providing location security in vehicular ad hoc networks. IEEE Wireless Commun. 16(6), 4855 (2009)
W. Wang, H. Man, Y. Liu, A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security Commun. Netw. 2(6), 669685 (2009)
L. Qinghua, Z. Sencun, C. Guohong, Routing in socially selfish delay tolerant networks, in Proceeding of the IEEE INFOCOM, 2010, p. 19
L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)
A. Lindgren, A. Doria, D. Schelen, Probabilistic routing in intermittently connected networks, in Proceeding of ACM SIGMOBILE Mobile Comp. Commun., 2003, pp. 19–20
A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceeding of 2nd Intl. Conference on Simulation Tools and Techniques (SIMU-Tools’ 09), Rome, Italy, Mar 2–6, 2009, pp. 1–9
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kandhoul, N., Dhurandher, S.K. (2019). An Asymmetric RSA-Based Security Approach for Opportunistic IoT. In: Woungang, I., Dhurandher, S. (eds) 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 27. Springer, Cham. https://doi.org/10.1007/978-3-030-11437-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-11437-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11436-7
Online ISBN: 978-3-030-11437-4
eBook Packages: EngineeringEngineering (R0)