Academia.eduAcademia.edu

Secure Channel Communication between IOT Devices and Computers

2023, IRJET

The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in an increase in both the quantity and complexity of malicious attacks. It is imperative to establish robust security measures for IoT networks to counteract malicious attacks, particularly with the aim of preventing unauthorized control over these devices. While numerous security solutions for IoT have been proposed in recent years, a significant portion of them lacks standardization and interoperability. As the IoT landscape continues to expand, the diversity and intricacy of IoT applications also grow, rendering such networks susceptible to attacks aimed at data theft, device takeover, and service disruption. A multitude of protocols and networking frameworks have been developed for IoT, with some achieving standardization and facilitating interoperability among devices and internet connectivity. These protocols have received endorsement from prominent standardization bodies such as IETF, IEEE, and industry consortia like the Rawan coalition and thread group. This paper's objective is to present a model that establishes secure communication channels among IoT devices as well as between these devices and a server or router, accomplished through the implementation of encryption algorithms. The popularity of smart home IoT systems is increasing due to their efficiency in simplifying various tasks. However, this trend also introduces vulnerabilities in terms of user privacy. Safeguarding the privacy of personal data remains a paramount concern for electronic services. To address this challenge, we employ well-established encryption algorithms such as RSA to create and utilize secure communication channels through Socket Programming for IoT devices.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net Secure Channel Communication between IOT Devices and Computers Harsha Kata, Harshith Singathala, Swarag Narayansetty, Sairam Reddy, Jyotsna Malla, Rishita Konda Kata, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India 2Harshith Singathala, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India 3Swarag Narayansetty, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India 4Sairam Reddy, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India 5Jyotsna Malla, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India 6Rishita Konda, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------1Harsha Key Words: —IoT devices, encryption algorithms, RSA, socket programming, communication channels, SHA256, cyber attacks, cybersecurity, communication protocols, cryptography Abstract - The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in an increase in both the quantity and complexity of malicious attacks. It is imperative to establish robust security measures for IoT networks to counteract malicious attacks, particularly with the aim of preventing unauthorized control over these devices. While numerous security solutions for IoT have been proposed in recent years, a significant portion of them lacks standardization and interoperability. As the IoT landscape continues to expand, the diversity and intricacy of IoT applications also grow, rendering such networks susceptible to attacks aimed at data theft, device takeover, and service disruption. 1.INTRODUCTION Lately, there has been a significant surge of interest in the concept of the Internet of Things (IoT), capturing the attention of both the industrial sector and academic circles alike. Within the realm of IoT, an immense array of objects equipped with sensors are tasked with amassing data, subsequently transmitting this information to servers for the purpose of analysis, management, and utilization. The ultimate goal is to construct intelligent systems such as smart grids, sophisticated transportation networks, healthcare systems, and even entire smart cities [1], [2], [3]. A multitude of protocols and networking frameworks have been developed for IoT, with some achieving standardization and facilitating interoperability among devices and internet connectivity. These protocols have received endorsement from prominent standardization bodies such as IETF, IEEE, and industry consortia like the Rawan coalition and thread group. Due to the prevailing tendency of relegating IoT security to a secondary concern, malicious actors commonly perceive smart devices as easily accessible targets, akin to "lowhanging fruit," susceptible to compromise and manipulation. The significance of prioritizing security, along with the inherent need for privacy, cannot be overstated in the context of IoT. The most reliable and effective approach for ensuring the protection of communication in smart devices is through encryption. Regrettably, striking a balance between convenience and security remains a formidable challenge, particularly when dealing with resource-constrained devices. As a result, numerous IoT products incorporate encryption features that are either ineffective, providing a false sense of security for communications and stored data, or they lack such features entirely [4]. This paper's objective is to present a model that establishes secure communication channels among IoT devices as well as between these devices and a server or router, accomplished through the implementation of encryption algorithms. The popularity of smart home IoT systems is increasing due to their efficiency in simplifying various tasks. However, this trend also introduces vulnerabilities in terms of user privacy. Safeguarding the privacy of personal data remains a paramount concern for electronic services. To address this challenge, we employ well-established encryption algorithms such as RSA to create and utilize secure communication channels through Socket Programming for IoT devices. Reported in a 2020 publication by Unit 42, a threat intelligence team, an astounding 98% of the 1.2 million IoT devices scrutinized across corporate networks exhibited a © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 303 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net significant deficiency: the absence of encryption capability for their network traffic. This critical shortcoming led to a vulnerability where 57% of these IoT devices became susceptible to potential threats, including unauthorized interception and manipulation of their data traffic. The same comprehensive report also shed light on the hazardous consequences of amalgamating IoT and IT assets within a Virtual Local Area Network (VLAN). This practice, as elucidated in the report, could result in compromised IoT devices owned by employees inadvertently disseminating malware throughout the entirety of the corporate network [5], [6]. 2. LITERATURE REVIEW The Internet of Things (IoT) has the potential to revolutionize numerous aspects of our daily routines and behaviors. With the pervasive nature of data sources, a substantial amount of information encompassing nearly every facet of human activity, whether public or private, will be generated, transmitted, collected, stored, and processed. As a result, ensuring the integrity and confidentiality of transmitted data, along with verifying the authenticity of the services providing that data, becomes paramount. This underscores the critical importance of security within the IoT framework. In the proposed model, we have incorporated MongoDB for authentication purposes. Additionally, within this project, the utilization of the SHA256 algorithm for password hashing has been employed. This approach ensures that even individuals overseeing the database cannot ascertain the actual password, as it is stored in a hashed form. The security of SHA-256 rests upon three key properties: 1. Data networks, particularly wireless ones, are susceptible to a wide array of attacks, including eavesdropping, impersonation, denial of service, and more. Traditional security measures employed in legacy Internet systems mitigate these threats by relying on encryption and authentication at various layers, including the interface, network, transport, and application layers. While some of these security solutions can be adapted for use in the IoT domain, the inherent limitations in processing power and communication capabilities of IoT devices hinder the implementation of full-fledged security suites. [8]. Resistance to Reverse Engineering: Foremost, it is exceedingly arduous to reverse engineer the original data from its corresponding hash value. A brute force attack, attempting to deduce the original data, would necessitate an astronomical 2^256 attempts. This level of computational infeasibility provides robust protection. 2. Collision Resistance: The likelihood of encountering two distinct messages producing the same hash value (referred to as a collision) is incredibly remote. With a vast 2^256 range of potential hash values, surpassing the count of particles in the observable universe, the probability of encountering two identical hash values is infinitesimal. 3. Avalanche Effect: Lastly, even a minor alteration to the initial data precipitates a significant change in the hash value, rendering it virtually impossible to discern that the new hash value is derived from similar data. This phenomenon is termed the "avalanche effect," further enhancing the security of the hash. Secure end-to-end communication channels are achievable within the unconstrained network (UCN) domain using advanced technologies like IPsec, SSL/TLS, or DTLS. However, these technologies cannot be directly applied to constrained network (CN) nodes due to their limitations in memory space and processing power. To address these challenges, this paper proposes a practical security architecture for the Internet of Things (IoT) with the following objectives: 1. Continued Use of UCN Security Suites: Existing security suites employed within UCNs will remain unaltered, ensuring compatibility with the UCN side. 2. Distinct Handling of Initial Security Handshakes: Initial security handshakes and protocols are managed differently within the CN to accommodate the constraints of limited nodes. This enables the establishment of secure end-to-end channels, allowing constrained devices to manage their complexity effectively. These properties collectively contribute to the robustness and security of the SHA-256 algorithm, making it a prudent choice for protecting sensitive data within our project. 3. Unconstrained Nodes Remain Unaffected: Unconstrained nodes continue to operate without any deviation from their standard procedures. The remaining part of the paper is organized as follows. Section 2 contains the Literature Survey. The Proposed Model is discussed in Section 3. Section 4 contains the Experiments and Results. Lastly, the Conclusion and Future Directions is presented in Section 5. © 2023, IRJET | Impact Factor value: 8.226 The proposed solution revolves around offloading computationally intensive tasks to a trusted unconstrained node. This node assumes responsibility for calculating the master session key on behalf of the limited IoT devices under its jurisdiction. IoT Gateways, positioned at the interface between UCN and CN, play a crucial role in mediating communication between these two domains. These gateways | ISO 9001:2008 Certified Journal | Page 304 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net often manage protocol layer variations, spanning physical and interface layers, and even extending to the application layer[13]. its applications and architectures. Furthermore, an increasing number of research initiatives are being undertaken to address challenges related to security, privacy, and trust as IoT devices become more widespread [15], [18]. In spite of end to end security, lower layers may keep utilizing heterogeneous security highlights across network subspaces or for highlight point communication [14] , [18]. This study delved into a range of secure, lightweight, and resilient solutions for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT), addressing the distinct security requirements and challenges inherent in these domains. We introduced a novel classification of existing protocols based on their key bootstrapping strategies, with the aim of establishing secure communication. Through a comprehensive analysis, we evaluated these protocols against various criteria to identify their respective advantages and limitations. Our findings suggest a departure from the conventional reliance on symmetric approaches for IoT security. Public key cryptography, particularly asymmetric methods, is emerging as a more viable option within the IoT landscape, provided that these methods are suitably optimized. Additionally, a trusted third party is poised to assume a more active role in enhancing IoT security, considering the heterogeneous nature of IoT deployments. Recent advancements in semiconductor technology have paved the way for cost-effective solutions to seamlessly integrate wireless connectivity into embedded processors and sensors. This, in turn, has sparked significant interest in the Internet of Things (IoT), which involves the interconnectedness of everyday objects. The IoT has emerged as a promising technology for the consumer electronics market, with the realm of smart homes being particularly highlighted. Smart homes hold immense potential for IoT deployment, facilitating home automation and efficient energy management. However, the rate at which IoT gains traction among homeowners hinges on their willingness to adopt these devices, and two primary factors influencing their decision are convenience and security. To address this, a Wi-Fi-based IoT smart home system has been conceptualized and realized, utilizing a gateway to establish secure communication among IoT devices. This gateway also enables users to configure, access, and control the system through an intuitive interface accessible from ubiquitous mobile devices, such as smartphones [7], [9].Inter-device communication is facilitated using the User Datagram Protocol. Prior to transmission, data messages undergo encryption using symmetric cryptography techniques like the Advanced Encryption Standard. The encryption employs a shared key generated through the Elliptic Curve DiffieHellman (ECDH) process [16]. Furthermore, it is imperative for security protocols to account for the resource-constrained nature of IoT devices. Cumbersome cryptographic operations like RSA and Diffie– Hellman key exchange protocols must be substituted with lightweight alternatives. For instance, the adoption of symmetric cryptography or more streamlined asymmetric algorithms such as ECC (Elliptic Curve Cryptography) and NTRU can significantly improve efficiency. Lightweight security protocols are also crucial in reducing the complexity of communication processes [19], [20]. The realm of smart-home Internet of Things (IoT) solutions is still in its infancy, and the factor of security looms large, significantly influencing the rate of their adoption. Designing a software security solution for smart-home environments presents a challenge due to the lack of user control over various elements. Additionally, integrating a privacy solution into existing software frameworks while considering user experience is another intricate task. The concept of the Internet of Things (IoT) revolves around creating a network of extensively interconnected devices, often referred to as "things." In the current context, the IoT encompasses a wide range of device types, including sensors, actuators, and RFID tags. These devices vary significantly in terms of size, capabilities, and functionalities. The central challenge lies in orchestrating this diverse network to operate seamlessly within the framework of the conventional Internet. In this paper, we introduced an authorization scheme for smart-home IoT devices that are connected to an untrusted cloud framework. Furthermore, we presented a proof-ofconcept software solution that leverages the FIDO protocol, enabling users to authenticate with their devices. We also proposed several extensions and adaptations of the FIDO protocol suitable for an IoT environment. The protocol we introduced prioritizes user anonymity by ensuring that manufacturers cannot establish a link between different user accounts. The most relevant user-related information consists of the FIDO public key and a pseudonym. Experimental results indicated that the additional delay introduced by the FIDO authentication protocol has a minimal impact on smart-home applications. Looking ahead, Motivated by this challenge, ongoing research endeavors are focused on adapting, applying, and transforming standard Internet protocols for use within the IoT. The efforts of the 6LoWPAN working group have enabled even the smallest, resource-constrained devices to become integral parts of the Internet by enabling IP communication over these devices. This exceptional feature empowers the connection of billions of devices to the Internet. For instance, a humidity sensor or an RFID tag can communicate not only with each other but also with a human using a smartphone or a remote backend server.While the concept of the IoT may seem straightforward, significant research efforts are still required. Various aspects of the IoT are under investigation, including © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 305 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net our future efforts will focus on various directions. These include testing the FIDO protocol with hardware authenticators, enhancing the security scheme with FIDO U2F features (second-factor authentication), adapting the software security stack for different hardware platforms and programming languages, and proposing an IoT device authentication scheme for smart homes using the privacy concepts outlined in this paper[10],[11],[12].The user-todevice connections, which form the foundation of our scenario, consider the user-device-driven nature of the security framework we propose. The authorization messages presented in this paper are secured through the FIDO protocol, and unlocking the FIDO private key requires biometric (fingerprint) authentication on the user device. The user-to-device authentication relies on the Android security framework and hardware security modules found in smartphones, such as fingerprint readers or ARM TrustZone [17]. Fig -1: Architecture Diagram of the proposed model A. SOCKET PROGRAMMING Communication between the IoT device and the client is established through socket programming, enabling a two-way exchange of messages between these two entities. Sockets serve as the endpoints of a bidirectional communication channel, allowing data transmission and reception. This communication can occur within a single process, between processes on the same machine, or even across processes on geographically distant locations [22], [23]. 3. PROPOSED MODEL The vulnerabilities present in IoT systems, combined with the potential interception and manipulation of communications by hackers, pose a significant threat. This can lead to inaccurate data reaching IoT devices, resulting in malfunctions and erroneous outcomes. Companies relying on IoT-derived data are exposed to risks, as manipulated data traffic can undermine the accuracy and reliability of their operations. To mitigate this, we have proposed the implementation of encrypted communication messages between IoT devices and clients, effectively thwarting the ability of hackers to tamper with the traffic. The creation of a socket involves the following step: s = socket.socket(socket_family, socket_type, protocol=0). For server-side operations, the following socket methods are utilized: 1. s.bind(): This method associates the socket with a specific address and port to listen for incoming client connections. Our encryption scheme offers several distinct advantages: a. Comprehensive Security: Our scheme achieves multiple security objectives in a single logical step, ensuring confidentiality, integrity, authentication, non-repudiation, and anonymity simultaneously. 2. s.listen(): It prepares the socket for accepting incoming client connections. 3. s.accept(): This method accepts an incoming client connection and returns a new socket object representing the connection, along with the address of the client. b. Heterogeneous Compatibility: The scheme accommodates the heterogeneity of IoT environments, allowing a sensor node utilizing identity-based cryptography to transmit messages to a server employing a public key infrastructure. This versatile compatibility renders our scheme well-suited for secure data transmission within IoT ecosystems. On the client side, the primary method is: 1. s.connect(): This method establishes a connection to the server, facilitating message exchange and communication between the client and the server. By incorporating encryption into the communication process between IoT devices and clients, we provide a robust defense against unauthorized tampering and manipulation, enhancing the overall security and trustworthiness of IoT systems. © 2023, IRJET | Impact Factor value: 8.226 In summary, socket programming enables seamless communication between IoT devices and clients through a well-defined set of methods and operations, allowing for the exchange of messages in a bidirectional manner. | ISO 9001:2008 Certified Journal | Page 306 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net interactions. These users are granted the privilege of sending authorized commands to IoT devices from clients. B. RSA ALGORITHM To safeguard against potential attacks aimed at intercepting and pilfering messages and data, encryption becomes imperative. Encrypting messages ensures that unauthorized access and decryption by hackers become formidable challenges. In our project, we employ the RSA algorithm for data encryption—a robust asymmetric key cryptographic algorithm rooted in public key encryption [21]. This algorithm is renowned for its formidable security and near-impossibility to break. In addition to encryption, our proposed model encompasses an authentication feature to validate users whose information is stored in a database. For this purpose, we utilize MongoDB, a user-friendly and highly scalable database system. MongoDB was chosen for its ease of use and scalability. To enhance security, passwords entered by clients are hashed before being stored in the database, further fortifying the protective measures. 2. Data Storage in MongoDB: Relevant user data, including login credentials, is stored securely within the MongoDB database. Notably, passwords are hashed to bolster security measures, safeguarding sensitive information. 3. Connection and Login: When a connection attempt is initiated, the client is prompted to provide login credentials. These credentials serve as authentication for access to IoT devices. 4. Valid Credentials: Upon entering correct login credentials, the user gains access to the IoT device and is authorized to issue commands. This ensures that only authenticated users can interact with the IoT device. 5. Invalid Credentials: In cases of incorrect or invalid credentials, access to the IoT device is denied, preventing unauthorized users from entering the system. The design of our proposed model takes into account resilience against various attacks: 1. Eavesdropping Attack: By encrypting the data, we effectively thwart eavesdropping attempts, making it extremely difficult for attackers to comprehend the intercepted information. 6. Encrypted Command Transmission: Any command issued by an authorized user is encrypted before transmission. This encrypted command is then securely sent to the IoT device. 2. Man-in-the-Middle Attack: The inclusion of encryption and authentication mechanisms helps mitigate the risk of man-in-the-middle attacks, as unauthorized intermediaries would be unable to decipher the encrypted communication or gain access through authentication. 7. Decryption and Execution: Upon reaching the IoT device, the encrypted command is decrypted and processed. The IoT device accurately interprets and executes the decrypted command as intended by the authenticated user. 3. ARP Spoofing Attack: Our model incorporates measures to counter ARP spoofing attacks, which involve manipulation of network address resolution. These precautions help maintain the integrity and authenticity of communication channels. This experimental setup showcases the seamless integration of MongoDB for user authentication, secure storage, and hashed passwords. The interaction between clients and IoT devices is streamlined through encrypted command transmission, ensuring that only authorized users can access and control IoT devices. The process reinforces the security, privacy, and overall integrity of the proposed model. In essence, our proposed model's combination of encryption, authentication, password hashing, and measures against specific attacks serves to enhance the overall security and integrity of the IoT communication framework. 4. EXPERIMENTS AND RESULTS In our experimental setup, we establish the MongoDB service to serve as the foundation for authentication within the proposed model. The primary objective is to ensure authorized access for making requests from clients to IoT devices. To achieve this, we follow these steps: 1. Adding User to MongoDB: Users are added to the MongoDB database to enable authorized © 2023, IRJET | Impact Factor value: 8.226 Fig -2: Starting MongoDB | ISO 9001:2008 Certified Journal | Page 307 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net Fig -7: Adding an user Fig -3: Development Environment Fig -8: Data added to MongoDB Fig -9: Login details given by the user Fig -4: generateKeys.py Fig -10: Client Server and IOT device run together Fig -5: Generating RSA Public and Private Keys Fig -11: User is logged into IOT device Fig -12: Encrypted command decrypted and read Fig -6: hash.py © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 308 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net 9. CONCLUSIONS Indeed, authentication and authorization are pivotal components for ensuring the security and trustworthiness of IoT devices. In our project, we have taken a comprehensive approach to address these aspects by implementing a secure channel communication protocol between IoT devices and clients. To achieve this, we have harnessed the power of several key concepts, including Socket Programming and Cryptography. The utilization of Socket Programming enables seamless communication between IoT devices and clients, facilitating the exchange of data and commands. On top of this foundation, we have integrated robust cryptographic measures to ensure the confidentiality and integrity of the transmitted information. Particularly, the industry-standard RSA algorithm has been employed to encrypt commands originating from the client devices to the IoT devices. Our implementation also showcases the significance of using MongoDB as a database for authentication purposes. MongoDB's popularity within the IoT developer community makes it a suitable choice for integrating this secure authentication mechanism into modern IoT applications. The database stores user credentials securely, and through proper authentication and authorization procedures, only authorized users gain access to the IoT devices. The amalgamation of these elements—Socket Programming, Cryptography, and MongoDB—results in a comprehensive and reliable framework that enhances the security and functionality of IoT devices. By focusing on secure communication, encryption, and proper user authentication, our project contributes to the advancement of IoT security and paves the way for future innovations in this field. REFERENCES [1] [4] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “IoT Security: Ongoing Challenges and Research Opportunities,” in 2014 IEEE 7th International Conference on Service-Oriented Comput ing and Applications, 2014, pp. 230–234, doi: 10.1109/SOCA.2014.58. [5] G. Cascavilla, R. Zwart, D. A. Tamburri, and A. Cuzzocrea, “Explaining IoT Attacks: An Effective and Efficient SemiSupervised Learning Framework,” in 2022 IEEE International Conference on Big Data (Big Data), 2022, pp. 5662–5671, doi: 10.1109/BigData55660.2022.10020894. [6] M. Roopak, G. Yun Tian, and J. Chambers, “Deep Learning Models for Cyber Security in IoT Networks,” in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019, pp. 452–457, doi: 10.1109/CCWC.2019.8666588. [7] T. Islam, R. A. Youki, B. R. Chowdhury, and A. S. M. T. Hasan, “An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home,” in Proceedings of the International Conference on Big Data, IoT, and Machine Learning, 2022, pp. 431–444. [8] H. Kim, A. Wasicek, B. Mehne, and E. A. Lee, “A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities,” in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016, pp. 114–122, doi: 10.1109/FiCloud.2016.24. [9] F. K. Santoso and N. C. H. Vun, “Securing IoT for smart home system,” in 2015 International Symposium on Consumer Electronics (ISCE), 2015, pp. 1–2, doi: 10.1109/ISCE.2015.7177843 [10] M. Malik, M. Dutta, and J. Granjal, “A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things,” IEEE Access, vol. 7, pp. 27443–27464, 2019, doi: 10.1109/ACCESS.2019.2900957. R. Zahid, M. W. Anwar, F. Azam, A. Amjad, and D. Mukhtar, “Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol,” in Information and Software Technologies, 2022, pp. 148–159. Y. Lu and L. Da Xu, “Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics,” IEEE Internet Things J., vol. 6, no. 2, pp. 2103– 2115, 2019, doi: 10.1109/JIOT.2018.2869847. [2] P. D. Babu, C. Pavani, and C. E. Naidu, “Cyber Security with IOT,” in 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), 2019, vol. 1, pp. 109–113, doi: 10.1109/ICONSTEM.2019.8918782. [11] [3] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022, doi: 10.1109/AC CESS.2022.3165809 [12] P. Mall, M. Z. A. Bhuiyan, and R. Amin, “A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function,” in Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019, pp. 26–35. [13] R. Sharma and R. Arya, “Secure transmission technique for data in IoT edge computing infrastructure,” Complex © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 309 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 p-ISSN: 2395-0072 www.irjet.net Intell. Syst., vol. 8, no. 5, pp. 3817–3832, 2022, doi: 10.1007/s40747-021-00576-7. [14] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,” Ad Hoc Networks, vol. 32, pp. 17–31, 2015, doi: https://doi.org/10.1016/j.adhoc.2015.01.006. [15] R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati, and M. Rossi, “Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples,” in 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012, pp. 1–7, doi: 10.1109/WoWMoM.2012.6263790. [16] K. K. Rout, S. Mallick, and S. Mishra, “Design and Implementation of an Internet of Things based Prototype for Smart Home Automation System,” in 2018 International Conference on Recent Innovations in Electrical, Electronics Communication Engineering (ICRIEECE), 2018, pp. 67–72, doi: 10.1109/ICRIEECE44171.2018.9008410. [17] Chifor, I. Bica, V.-V. Patriciu, and F. Pop, “A security authorization scheme for smart home Internet of Things devices,” Futur. Gener. Comput. Syst., vol. 86, pp. 740– 749, 2018, doi: https://doi.org/10.1016/j.future.2017.05.048. [18] R. Roman, R. Arjona, and I. Baturone, “Post-quantum Secure Com- ´ munication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract),” in Attacks and Defenses for the Internet-of-Things, 2022, pp. 72–83. [19] R. V. S. Boolakee, S. Armoogum, R. Foogooa, and G. Suddul, “Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols,” in Progress in Advanced Computing and Intelligent Engineering, 2021, pp. 337–349. [20] S. Encheva and S. Tumin, “Simple E2EE Secure Communication Protocol for Tiny IoT Devices,” in Cooperative Design, Visualization, and Engineering, 2022, pp. 286–292. [21] S. Encheva and S. Tumin, “Simple E2EE Secure Communication Protocol for Tiny IoT Devices,” in Cooperative Design, Visualization, and Engineering, 2022, pp. 286–292. [22] C. Mateo, F. Almagro, W.-J. Yi, and J. Saniie, “Design Flow and Implementation of an IoT Smart Power Socket,” in 2021 IEEE Inter national Conference on Electro Information Technology (EIT), 2021, pp. 151–156, doi: 10.1109/EIT51626.2021.9491841. © 2023, IRJET | Impact Factor value: 8.226 [23] | A. Rehman, A. R. Syed, I. U. Khan, A. A. Mustafa, M. B. Anwer, and U. A. Ali, “IoT-Enabled Smart Socket,” Wirel. Pers. Commun., vol. 116, no. 2, pp. 1151–1169, 2021, doi: 10.1007/s11277-020-07043-5. ISO 9001:2008 Certified Journal | Page 310