An Overview of Secure Communications for
the Internet of Things
Seyed Ali Zoljalali Moghadam
Electrical Engineering Department
Electrical and Computer Faculty
Tarbiat Modares University
Tehran, Iran.
[email protected]
Peyman Vafadoost
Biomedical Engineering Department
Electrical and Computer Faculty
Hakim Sabzevari University
Sabzevar, Iran.
[email protected]
Received: 24 November 2023 – Revised: 16 April 2024 - Accepted: 6 May 2024
Abstract—As an emerging technology that combines both digital and physical realms, access to information technology
has expanded (IoT) the Internet of Things. The Internet of Things, as it becomes more pervasive, will overshadow
human life as much as possible. Some of the major challenges associated with the development of this phenomenon have
been the issue of security, which is needed in all its layers and even specifically in individual layers. According to the
structure and applications of the Internet of Things, as well as the threats and challenges in cyberspace, we first examine
security needs and then, by examining some methods of securing the Internet of Things, we propose a method according
to the approaches discussed.
Keywords: IoT, IPsec, 6LoWPAN, Security, IEEE 802.15.4, Security, Privacy
Article type: Research Article
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
© The Author(s).
Publisher: ICT Research Institute
I.
INTRODUCTION
The future of the Internet is a network with the IPv6
protocol that includes traditional computers and a large
number of smart objects [1]. Smart objects, often
referred to as things, usually have small built-in
computers with communication, measurement, and
excitation capabilities. The Internet of Things (IoT)
function will be the beginning of many services,
enabling the connection between traditional computers
and intelligent objects on a global scale. Therefore, it is
very important to check the security conditions, ie
Corresponding Author
authentication,
integrity,
confidentiality in IoT.
nonrepudiation
and
The Internet of Things (IoT) refers to the concept of
connecting everyday objects and devices to the internet,
enabling them to collect and exchange data. These
objects, also known as smart objects or things, are
equipped with sensors, actuators, and embedded
systems that allow them to interact with their
environment and communicate with other devices or
systems.
One of the key aspects of IoT is the use of the IPv6
protocol, which provides a much larger address space
18
Volume 16- Number 2 – 2024 (17 -24)
compared to the older IPv4 protocol. With IPv6, there
are virtually limitless unique addresses available,
allowing for the connection of a vast number of devices
and objects to the internet.
The integration of IoT into our lives opens up a wide
range of possibilities and applications. Smart homes,
for example, can have interconnected devices such as
thermostats, lighting systems, security cameras, and
appliances that can be controlled and monitored
remotely. Industrial sectors can benefit from IoT by
implementing smart systems for monitoring and
optimizing processes, predictive maintenance, and
inventory management.
The Internet of Things has become an integral part
of modern life, connecting devices and data to provide
greater efficiency, automation and control.
In general, at present, the architecture has not been
designed and built with a global standard for the
Internet of Things, and for this reason, explaining the
architecture of the Internet of Things can be a bit
difficult and problematic. If we want to talk about this
issue in general, it can be said that it completely
depends on the functioning and implementation of its
various components and parts. However, there is a basic
process in the architecture of the Internet of Things in
this field, which the Internet of Things is built on. This
architecture is also called the four-layer architecture of
the Internet of Things.
•
The layer of sensors that is responsible for
receiving information.
•
The network layer that is responsible for
transmitting the received data.
•
The information and data processing layer
that can draw conclusions from the
received data.
•
Finally, they are the application layer that
directly communicates with the user.
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
The proper functioning of each of these layers will
be necessary and necessary for the proper functioning
of Internet of Things equipment [20]. Figure 1 is for
Internet of Things architecture
However, with the increased connectivity and data
exchange in IoT, security becomes a critical concern. It
is essential to ensure that IoT systems and devices are
protected from unauthorized access, data breaches, and
malicious attacks. Authentication methods, such as
secure protocols and encryption, are used to verify the
identity of devices and establish secure communication
channels. Integrity mechanisms help ensure that data
remains unaltered during transmission, while nonrepudiation measures prevent the denial of actions or
transactions. Additionally, confidentiality measures,
such as data encryption, protect sensitive information
from unauthorized disclosure.
As IoT continues to evolve and expand, addressing
security challenges will be crucial to leverage its full
potential while safeguarding privacy and mitigating
risks.
.
Figure 1. Internet of Things architecture [21]
Smart objects are usually connected to each other
using a wireless IEEE 802.15.4 [2] network. You can
use the border router to connect to the 802.15.4 network
on the Internet to activate the IPv6 connection between
smart objects and the Internet host. However, IPv6
packets that travel on 802.15.4 networks use IPv6
compressed header templates to use bandwidth sources.
To ensure compatibility with the available Internet, the
border router must compress the IP packet header when
sending packets.
In IoT networks, smart objects often communicate
with each other using a wireless IEEE 802.15.4 network
[2]. To establish a connection between these smart
objects and the internet, a border router can be utilized.
The border router acts as a bridge between the 802.15.4
network and the internet, enabling the activation of
IPv6 connectivity for the smart objects to communicate
with internet hosts.
When transmitting IPv6 packets over 802.15.4
networks, a technique called IPv6 compressed header is
employed to optimize bandwidth usage. This involves
using compressed header templates specifically
designed for IPv6 packets traveling through 802.15.4
networks. By compressing the IP packet headers, it
allows for more efficient utilization of network
resources and reduces the overhead associated with
transmitting data.
For compatibility with the existing internet
infrastructure, the border router is responsible for
compressing the IP packet headers when sending
packets from the 802.15.4 network to the internet. This
compression process ensures that the IPv6 packets can
seamlessly traverse the network while minimizing
bandwidth consumption and maintaining efficient
communication between smart objects and internet
hosts.
By utilizing these techniques, the IoT ecosystem
can efficiently exchange data between smart objects
and the internet, enabling seamless connectivity and
communication while optimizing network resources.
Currently, 6LoWPAN relies on 802.15.4 security
mechanisms. A single network key is used to secure
data based on the hop-by-hop. This prevents
unauthorized access to the 802.15.4 network and
ensures its security until the key is secure and not
available to hackers. However, in the context of the IoT,
such an approach cannot provide end-to-end (E2E)
security in terms of authentication, integrity,
nonrepudiation, and confidentiality. Clearly, additional
or alternative mechanisms are needed. How to make a
connection is E2E using the IPsec protocol [4]. IPsec
defines the security plugins of the IP protocol to
Volume 16- Number 2 – 2024 (17 -24)
implement security. Therefore, it makes sense to
consider the option of using IPsec in 6LoWPAN
networks. In this article, we present 6LoWPAN / IPsec
and show the durability and reliability of this approach.
Our 6LoWPAN / IPsec Add-ons app is shown in
Figure 2 for a real E2E secure connection between
smart objects and the Internet host. We define header
compression for IPsec IPv6 add-on headers:
authentication header (AH) and Encapsulating Security
Payload (ESP). We provide an implementation and
evaluation of the 6LoWPAN / IPsec extension for
intelligent running objects running the well-known
Contiki operating system [5]. This implementation
takes advantage of the encryption capability provided
by the 802.15.4 standard transceivers.
19
•
•
•
Industry (process control)
Construction
(intelligent
construction
management)
Individuals (location services, health management
and supervision, etc.)
III.
IOT GROWTH
As shown in Figure 3, the increase in the number of
devices connected to the Internet has a very fast trend.
An interesting trend that has contributed to the growth
of the Internet of Things is the transition of the Internet
of Things. 4 IP protocol is version 6 of that protocol. If
we consider version 4 for consumers such as laptops
and tablets, version 6 of this protocol includes sensors,
smart systems and cluster systems[17].
The main focus of this article is to compare the
security of 6LoWPAN / IPsec with the security of
802.15.4 traditional link-layer. To do this, we also
implement 802.15.4 link layer security for the Contiki
operating system, which allows us to test and compare
both security mechanisms in one platform. Our
experiments show that traditional 802.15.4 link layer
security does not significantly improve network
performance better than our proposed 6LoWPAN/IPsec
security.
The main points of the article, which we will discuss
more, are as follows:
•
We provide a definition of 6LoWPAN for IPsec,
supporting AH and ESP.
•
We provide a complete implementation and
evaluation of the tested performance of 6LoWPAN
/ IPsec. We also show the benefits of using
cryptographic hardware support from the 802.15.4
transceivers.
Figure 3. Anticipated increase in IoT device adoption.
In recent years, the Internet of Things has emerged
as one of the fastest growing technologies in the field of
information and communication technology (ICT).
This concept means connecting various devices,
sensors and objects to the Internet in order to collect,
send and exchange data and information. With the
advancement of various technologies, including the
Internet of Things, we have seen a significant growth in
the number and type of objects connected to the
Internet.
This massive growth in the Internet of Things is due
to the many benefits it brings, including:
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
Figure 2. IEEE 802.15.4 security can communicate via IPv6 via a
low-power personal wireless device (6LoWPAN)
II. INTERNET OF THINGS APPLICATIONS
The development of new types of sensors and
actuators in the combination of inclusive and growing
network communications shapes the Internet of Things
concept and greatly demands users for new services in
the evolution of the Internet and IoT [16]. There are
many factors involved, including reducing the price of
the equipment involved. Increasing the efficiency of the
devices will lead to more and better services to the end
user. Over the next few years, we will see the
widespread penetration of IoT-capable chips into all
types of physical objects, which will expand
applications such as the following:
•
•
Smart homes (environmental control and smart
appliances) ·
Smart city (resource control, such as street
lighting, waste management, water and energy
management, traffic control, etc.)
•
Access to information at any time and
place: Connecting objects to the Internet
provides the possibility of accessing data
and information about them instantly and
at any time and place, which helps to
improve the efficiency and usability of
various services. .
•
Optimal use of resources: The Internet of
Things enables the optimal use of various
resources, including energy, time, and
materials needed to execute processes and
tasks.
•
Smart and automatic connections: Using
the Internet of Things, connections
between objects are made smarter and
more automatic, which helps to improve
the efficiency and functions of various
systems and devices.
The Internet of Things will play an important role in
human life in the future. The Internet of Things will be
20
Volume 16- Number 2 – 2024 (17 -24)
used in various industries, including healthcare,
automotive, agriculture, smart cities, environment, etc.,
which will help improve the quality of life,
productivity, security, and sustainability of
communities and the environment. In general, the
Internet of Things, as one of the main technological
developments in recent decades, has a lot of potential to
change and improve people's lives in the future.
In this situation, although this equipment is present
in all aspects of personal life and controls it and
supports new business models, it increases the
efficiency of many applications and ultimately
improves people's lives, but naturally its risks are also
significant. It is more and therefore requires strong
security components. In particular, if we focus on the
important approach of smart homes, we can limit the
ability to intrude on privacy by considering explicit and
directly related data to the people living in the home.
However, the activities of these people can be followed
indirectly by examining the physical and network
activities of the equipment and devices inside the house.
Cyberspace security is defined by the three components
of confidentiality, accuracy and accessibility, which
can be considered as the basic needs of IoT security. In
many cases, a major disruption to the traditional model
poses its own challenges. The following are some of the
challenges posed by the Internet of Things:
•
Critical functionality: In addition to devices,
systems and appliances in a home, embedded
devices also are found controlling the world’s
transportation infrastructure, the utility grids,
communication systems and many other
capabilities relied upon by modern society.
Interruption of these capabilities by a cyber-attack
could have catastrophic consequences.
Replication: Once designed and built, embedded
devices are mass produced. There may be
thousands to millions of identical devices. If a
hacker is able to build a successful attack against
one of these devices, the attack can be replicated
across all devices.
•
Security assumptions: Many embedded engineers
have long assumed that embedded devices are not
targets for hackers. These assumptions are based
on outdated assumptions including the belief in
security by obscurity. As a result, security is often
not considered a critical priority for embedded
designs. Today’s embedded design projects are
often including security for the first time and do not
have experience and previous security projects to
build upon.
•
Not easily patched: Most embedded devices are not
easily upgraded. Once they are deployed, they will
run the software that was installed at the factory.
Any remote software update capability needs to be
designed into the device to allow security updates.
The specialized operating systems used to build
embedded devices may not have automated
capabilities that allow easy updates of the device
firmware to ensure security capabilities are
frequently updated. The device itself may not have
the IO or required storage that allows for updating
to fight off security attacks.
•
Long life cycle: The life cycle for embedded
devices is typically much longer than for PCs or
consumer devices. Devices may be in the field for
15 or even 20 years. Building a device today that
will stand up to the ever evolving security
requirements of the next two decades is a
tremendous challenge.
•
Proprietary/industry specific protocols: Embedded
devices often use specialized protocols that are not
recognized and protected by enterprise security
tools. Enterprise firewalls and intrusion detection
system are designed to protect against enterprise
specific threats, not attacks against industrial
protocols.
•
Deployed outside of enterprise security perimeter:
Many embedded devices are mobile or are
deployed in the field. As a result, these devices
may be directly connected to the Internet with none
of the protections found in a corporate
environment.
IV.
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
THE CHALLENGE OF SECURITY ON THE
INTERNET OF THINGS
Undoubtedly, information is one of the most
valuable assets of today's organizations and businesses,
and defects in data storage equipment, human errors,
virus attacks, software errors, and accidents such as fire
and earthquake are among the most common causes of
destruction and loss. giving digital information and
data, and in order to protect data, considering that the
budget for dealing with cyber-attacks on the Internet of
Things is not high and it is necessary to adopt
appropriate tactics in this sensitive field, strict
regulatory standards for greater security can be
integrated in order to integrate Information technology
and computing technology mentioned [18]. Also, the
hardware and software equipment available in the
Internet of Things has provided different platforms for
exchanging information between them. The
information on the chips of objects connected to the
Internet can be stolen, therefore, by using the
encryption and decryption protocols available in the
platforms, the information can be protected, mostly the
data generated by the Internet of Things devices based
on time and They are based on events that respond to
needs with the help of a database. One of the
requirements of this type of databases is to have a
suitable platform [19].
•
A. Embedding cryptographic algorithms
Much research has been done on reducing the
complexity of encryption algorithms or improving the
efficiency of protocols and key distribution in a secure
manner.
For example, TinyECC [6] and NanoECC [7] used
elliptical curve encryption to allow encryption on open
source devices. For example, Liu and Ning [8], and
Chong and Rudig [9] provided key distribution
mechanisms to store bandwidth in limited resource
networks.
Volume 16- Number 2 – 2024 (17 -24)
B. IoT security at the link layer
IP communication between intelligent objects uses
6LoWPAN [3], each based on the IEEE 802.15.4 [2]
link layer. IEEE 802.15.4 provides data encryption and
integrity verification. Link layer security provides hopby-hop security in which each node in the
communication path (including the 6LoWPAN border
router; as shown in Figure 2) is reliable. A private key
is used to protect all messages and packets. In addition,
messages sent from the 802.15.4 network and continue
their route on the network using IP are not protected by
link layer security mechanisms. Therefore, in many of
the solutions provided for this challenge, a separate
security mechanism has been added to protect data
between Internet hosts and border routers. An example
of this solution is ArchRock PhyNET [10], which adds
IPsec in a tunnel mode between the border router and
the Internet host. Recently, Roman and a number of
colleagues. [11] Provides a method for key
management systems for the sensor network that is
applicable to the security of the link layer. Because any
node, including border routers, must be trusted, E2E
security in the IoT cannot be achieved using the
specified method.
C. Securing the IoT at the transport layer
End-to-end security may be provided using (TLS)
[12] or (SSL). TLS and SSL are used extensively on the
Internet to ensure secure communication between hosts.
In addition to being confidential and integrity, TLS and
SSL also authentication between Internet hosts. There
are problems that challenge the use of these protocols
to ensure security in the IoT. TLS can only be used in
TCP, which is not a good way to communicate between
smart objects because TCP makes it possible to use
more resources from low-power devices. However,
Hong and colleagues have proposed SSL as a security
mechanism for the IoT. [13] Their assessment shows
that this security mechanism is actually quite costly
because full access to SSL is done if data transfer takes
2 seconds. Also (UDP) version of TLS called DTLS can
be used in 6LoWPAN networks. However, the
6LoWPAN specification does not provide compression
for DTLS.
V.
Figure 4. IPv6 over low-power wireless personal area networks
(6LoWPAN) context-aware compression mechanisms [14].
B. Overview of IEEE 802.15.4 security
Currently, 6LoWPAN trusts 802.15.4 [2] security to
protect communication between neighboring nodes.
The standard supports access control, message
integrity, confidentiality, and replay protection.
Message integrity is achieved using (MAC) in
envelopes. If the recipient fails to confirm the desired
MAC, the envelope will be deleted according to the predefined instructions. Figure 5 shows the structure of an
802.15.4 packet with optional security headers.
Security modes supported by 802.15.4 include (AESCTR) only for encryption, AES in blockchain mode
(AES-CBC) only to validate the message. For MAC
modes, the authentication code is 4, 8 or 16 bytes. In
addition to the default mode (security features not
available), AES-CCM is the only mandatory state by
default that must be implemented on all devices
compatible with the standard.
The IEEE 802.15.4 standard currently uses preshared keys to encrypt and integrity message.
BACKGROUND
In this section, we provide an overview of the workrelated technologies presented in this article. We
provide background information on IPv6 and
6LoWPAN [3], IPsec [4] and on security 802.15.4 [2].
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
21
A. Overview of 6LoWPAN
IPv6 is used through a low-power wireless personal
network [3] to connect to the Internet and smart objects
by specifying how IPv6 data is transmitted over the
IEEE 802.15.4 network (Fig 4). 6LoWPAN works as a
unique layer between the IP layer and the link layer,
one of which is to compress the IP header and, if
necessary, fragment the data. The maximum
transmission unit (MTU) of 802.15.4 is 127 bytes. If
802.15.4 security is enabled, the maximum load will be
reduced to 81 bytes.
Figure 5. IEEE 802.15.4 frame with security headers [14].
C. Overview of IPsec
IPv6, with its unlimited potential of 2128 address
space, makes it possible to assign a unique address to
any physical device on Earth. In addition to increasing
the address space, IPv6 also provides IP security
compared to IPv4. IPv6 uses IPsec [4] to communicate
IP between two endpoints. IPsec is a set of protocols,
which include AH and ESP. AH, which provides
authentication services, ESP provides both
authentication and privacy services.
In this article, various security methods that are
used to protect information in network communication
were investigated. In general, the use of IPSec provides
security compared to other methods such as SSL/TLS
and SSH, by providing protection for data transmission
through encryption and creating secure tunnels
22
Volume 16- Number 2 – 2024 (17 -24)
between devices, while SSL/TLS uses encryption
protocols for It uses secure communication between
user and server (such as HTTPS) and SSH provides
secure communication between two devices using
encryption.
•
The following table provides some basic and
important features for comparison between IPsec and
IEEE 802.15.4.
•
TABLE I.
•
COMPARISON BETWEEN IPSEC AND IEEE 802.15.4
METHODS
Property
Type of
communication
Security level
Encryption
IPsec
between
different
networks
Wireless
sensor
networks,
ZigBee
High
Yes
Authentication
Yes
Related protocols
IP, ESP, AH
Common use
VI.
IEEE 802.15.4
between wireless
devices on a network
VPN, secure
connection between
networks, secure
internet connections
Middle
Depending on the
implementation and
communication
Depending on the
implementation and
communication
MAC, Zigbee
•
•
6LOWPAN/IPSEC EXTENSION
Of the eight possible EID values, six are allocated
by specification HC15. There are actually two
remaining slots (101 and 110) in reserve. Since AH and
ESP are headers for IP extensions, it makes sense to
use one of those reserved AH and ESP slots for
compression. We 're proposing to use one of the
reserved slots, say 101, to identify an AH or ESP
header as the next header.
Figure 6. LOWPAN_NHC_AH: next header compression
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
•
If SPI = 0, then the default SPI is used for
the 802.15.4 network and the SPI field is
omitted. We set SPI by default to 1. This
does not mean all nodes are using the
same SA, but each node has a single
preferred SA defined by SPI 1.
If SPI = 1, all 32 bits displaying the SPI
will be brought inline
If SN = 0, the first 16 bits of the number
of sequences are elided. The remaining
bits are transported inline.
If SN = 1 is carried inline all 32 bits of the
sequence number
If NH = 0, the next header field in AH is
used to specify the next header.
If NH = 1, then elide the next header field
in AH. The next header is encoded
through NHC.
A. LOWPAN_NHC_AH encoding
Figure 6 illustrates our AH encoding for the NHC.
Next we went
Describe the position of all relevant fields:
• The first four bits of the NHC AH
represent the NHC ID we define for AH.
These are fixed at 1101
• If PL = 0, the area of payload (length of
header IPsec) is omitted in AH. This
length can be obtained from the SPI value,
since the authentication data length
depends on the algorithm used and is fixed
for any input size
• When PL = 1, the payload value after the
NHC AH header is held inline.
Figure 7. A compressed and authentication header secured
IPv6/User Datagram Protocol packet
Note that AH calculates the MIC on the
uncompressed IP header even when used in
6LoWPAN,
thus
allowing
authenticated
communication with the Internet hosts. The minimum
length of a standard AH which supports the mandatory
HMAC-SHA1-96 and AES-XCBC-MAC-96 consists
of 12 bytes of header fields plus 12 bytes of ICV.
Following optimum compression, we get a header size
of 4 bytes plus 12 bytes of ICV.
Figure 7 shows a compressed IPv6 / UDP packet
which is secured using HMAC-SHA1-96 with AH.
B. LOWPAN_NHC_ESP encoding
Figure 8 shows the encoded NHCs we are
proposing for ESP. Next, the function of each header
field is described as:
• The first 4 bits we define for ESP in the NHC
ESP represent the NHC ID. These are fixed at
1110.
• The next bit remains unused. To achieve coding
similarity between AH and ESP, we leave this
field empty (ESP does not have a field for payload
lengths). This field could however be used to
increase SPI coding to 2 bits if necessary
• If SPI = 0, then the default SPI is used for the
Volume 16- Number 2 – 2024 (17 -24)
•
•
•
•
•
802.15.4 network and the SPI field is omitted. We
set SPI by default to 1. This does not mean all
nodes are using the same SA, but each node has a
single preferred SA identified by SPI 1.
If SPI = 1, all 32 bits showing the SPI will be
carried inline
If SN = 0 is used first 16 bits of sequence number.
The remaining 16 bits are presumed to be nil.
If SN = 1 is carried inline all 32 bits of the
sequence number
If NH = 0, then the next ESP header field will be
used to specify the next header, and it will be
carried inline.
If NH = 1, it encodes the next header using NHC.
In the case of ESP, we cannot skip the next header
unless 6LoWPAN compression / decompression
and encryption / decryption are jointly executed by
the end hosts. Based on the next header value, the
nodes in the 6LoWPAN network make their
decision about the next header, not the actual
header that is carried inline.
Remember that the minimum overhead for ESP
without authentication is 18 bytes, AES-CBC and
perfect block alignment. This header overhead is
reduced to 14 bytes, after optimal compression. ESP
with authentication contains a further 12 ICV bytes.
Figure 8 shows a secured UDP / IP packet with
compressed ESP. The shaded portion stands for ciphertext.
23
foundation for connectivity and communication. As we
increasingly depend on IoT for various services in our
daily lives, the availability and reliable performance of
IP become crucial. However, alongside the benefits of
IoT, ensuring its security is of paramount importance.
While the IEEE 802.15.4 link layer provides some
security features, it may not offer the necessary end-toend (E2E) security required for IoT deployments.
Therefore, alternative methods need to be explored to
enhance network security and protect IoT systems and
data.
One such method is the use of IPsec (IP security),
which can be implemented through the 6LoWPAN
(IPv6 over Low Power Wireless Personal Area
Networks) extensions. IPsec provides a robust
framework for securing IP communications by offering
features such as authentication, encryption, integrity,
and confidentiality. By leveraging 6LoWPAN, IPsec
can be extended to IoT devices and networks, enabling
E2E security.
Implementing IPsec through 6LoWPAN extensions
allows for secure communication between IoT devices,
ensuring that data remains confidential, unaltered, and
protected from unauthorized access. It enhances the
overall security posture of IoT deployments and helps
mitigate the risks associated with potential
vulnerabilities in the network.
By adopting IPsec with 6LoWPAN, IoT systems
can benefit from E2E security, safeguarding sensitive
information and ensuring the integrity and privacy of
data transmitted within the IoT ecosystem. This
approach provides a viable option for addressing the
security challenges of IoT and enhancing the
trustworthiness of IoT-enabled services and
applications [15].
REFERENCES
[1]
Figure 8. LOWPAN_NHC_ESP: next header compression
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
The UDP header is encrypted when using ESP, and can
therefore not be compressed. One solution for enabling
UDP header compression when using ESP is to specify
a new encryption algorithm for ES, which can perform
6LoWPAN UDP header compression plus source and
destination encryption. Since such a solution would not
be viable until 6LoWPAN is massively adopted, we do
not specify its details.
[2]
[3]
[4]
[5]
VII. CONCLUSION
The future of the Internet of Things will be based on
IP. Because we will benefit from many services in the
future, our daily lives will depend on its availability and
reliable performance. So it's important to find ways to
secure your IoT. Because the security of the IEEE
802.15.4 link layer does not provide the necessary
security for E2E, alternative methods must be found to
ensure network security. In this article, we've shown
that IPsec, implemented through the 6LoWPAN
extensions, is a good option for providing E2E security
on IoT.
Indeed, the future of the Internet of Things (IoT)
heavily relies on IP (Internet Protocol) as it provides the
[6]
[7]
[8]
G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals
of Lipschitz-Hankel type involving products of Bessel
functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp.
529–551, April 1955. (references)
J. Clerk Maxwell, A Treatise on Electricity and Magnetism,
3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
I. S. Jacobs and C. P. Bean, “Fine particles, thin films and
exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and
H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
Lombardi, Marco, Francesco Pascale, and Domenico
Santaniello. "Internet of things: A general overview between
architectures, protocols and applications." Information 12, no.
2 (2021): 87.
Dunkels A, Grönvall B, Voigt T. Contiki—a lightweight and
flexible operating system for tiny networked sensors. In
Proceedings of 1st IEEE Workshop on Embedded Networked
Sensors (EmNetS’04), Tampa, USA, 2004.
Liu A, Ning P. TinyECC: a configurable library for elliptic
curve cryptography in wireless sensor networks. In
Proceedings of 7th International Conference on Information
Processing in Sensor Networks (IPSN’08), Washington, DC,
USA, 2008.
Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R.
NanoECC: testing the limits of elliptic curve cryptography in
sensor networks. In Proceedings of 5th European Conference
on Wireless Sensor Networks (EWSN’08), Bologna, Italy,
2008.
Liu D, Ning P. Establishing pairwise keys in distributed sensor
networks. In Proceedings of 10th ACM Conference on
Computer and Communications Security (CCS), New York,
NY, USA, 2003.
24
Volume 16- Number 2 – 2024 (17 -24)
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
Chung A, Roedig U. DHB-KEY: an efficient key distribution
scheme for wireless sensor networks. In Proceedings of 4th
IEEE International Workshop on Wireless and Sensor
Networks Security (WSNS’08), Atlanta, USA, 2008.
Arch Rocks Adds Ruggedized Version Of IP-Based ‘PhyNet’
Wireless Sensor Network for Harsh Outdoor Enivorments,
With PhyNet N4X, Protected Devices Monitor Air Quality,
Traffic, Toxics, Solar Power, Crop Health and More; Users
Analyze the Data Remotely,2008
Roman R, Alcaraz C, Lopez J, Sklavos N. Key management
systems for sensor networks in the context of the Internet of
Things. Computers and Electrical Engineering 2011; 37(2):
147–159.
Oppliger, Rolf. SSL and TLS: Theory and Practice. Artech
House, 2023.
Hong S, Kim D, Ha M, et al. SNAIL: an IP-based wireless
sensor network approach to the Internet of Things. Wireless
Communications, IEEE 2010; 17(6): 34–42.
Shahid Raza, Simon Duquennoy, Joel Höglund,Utz Roedig
and Thiemo Voigt: Secure communication for the Internet of
Things— a comparison of link-layer security and IPsec for
6LoWPAN, Networks 2014; 7:2654–2668
Rachit, Shobha Bhatt, and Prakash Rao Ragiri. "Security trends
in Internet of Things: A survey." SN Applied Sciences 3
(2021): 1-14.
D.Geneiatakis, I.Kounelis, R.Neisse , I.Nai-Fovino ” Security
and Privacy Issues for an IoT based Smart Home” 2017 40th
International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) ,
Pages: 1292 - 1297 IEEE Conference Publications.
Hamdan, Salam, Moussa Ayyash, and Sufyan Almajali. "Edgecomputing architectures for internet of things applications: A
survey." Sensors 20, no. 22 (2020): 6441.
Nick Heudecker. DBMS Characteristics for the Internet of
Things. 2015. gartner.com
Scott Matteson. How to secure your IoT devices from botnets
and other threats. 2017.techrepublic.com.
Anthi, Eirini, Lowri Williams, Małgorzata Słowińska, George
Theodorakopoulos, and Pete Burnap. "A supervised intrusion
detection system for smart home IoT devices." IEEE Internet
of Things Journal 6, no. 5 (2019): 9042-9053.
Jin, Wenquan, and Dohyeun Kim. "Resource management
based on OCF for device self-registration and status detection
in IoT networks." Electronics 8, no. 3 (2019): 311.
[ Downloaded from ijict.itrc.ac.ir on 2024-09-02 ]
Seyed
Ali
Zolajalali
Moghaddam received his B.Sc.
degree in Electrical Engineering
from Hakim Sabzevari University,
Sabzevar, Iran, in 2019 and M.Sc.
degree in Electrical Engineering
from Tarbiat Modares University,
Tehran, Iran, in 2022.
Powered by TCPDF (www.tcpdf.org)
Peyman Vafadoost Sabzevar
received his B.Sc. degree in
Computer Engineering and his
M.Sc degree in Biomedical
Engineering in 2020 and 2023
from Hakim Sabzevari University,
Sabzevar, Iran, respectively. His
research interests include Internet
of Things and Machine Learning.