ENERGY AWARE SECURITY ALGORITHM DECISION METHOD FOR INTERNET OF THINGS USING SSL/TLS FOR WIRELESS NETWORK
Keywords:Internet Of Things, SSL/TLS, MQTT, Security Service, Energy Efficiency
The Internet of Things (IoT) is an ever evolving infrastructure of physical objects and Internet-enabled devices and systems featuring IP addresses for connectivity. Physical objects consist of home appliances, electronic gadgets, machinery, healthcare items, wearable devices and anything that could be connected to the Internet. Each type of connection requires particular types of security service. Security algorithms in user devices are fixed by default and selected based on preferences. This limitation causes energy waste since a user might be using all services in an algorithm, even those the user does not need. In order to counter this problem, we propose an energy aware security service selection method that saves energy by selecting only particular types of security service required by a given connection. In this paper, we compared the energy consumption of each communication to provide integrity, authentication, and confidentiality in Secure Sockets Layer/Transport Layer Security (SSL/TLS) with our proposed method. The experimental results demonstrate the validity of our proposed method. Our proposed method saved 54.94% energy for integrity and 74.52% for authentication.
K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference On, 2013, pp. 663-667. DOI: https://doi.org/10.1109/CIS.2013.145
L. Atzori, A. Iera and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, pp. 2787-2805, 2010.
I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F. V. d. Abeele, E. D. Poorter, I. Moerman and P. Demeester, "IETF standardization in the field of the internet of things (IoT): a survey," Journal of Sensor and Actuator Networks, vol. 2, pp. 235-287, 2013. DOI: https://doi.org/10.3390/jsan2020235
S. Bandyopadhyay and A. Bhattacharyya, "Lightweight internet protocols for web enablement of sensors using constrained gateway devices," in Computing, Networking and Communications (ICNC), 2013 International Conference On, 2013, pp. 334-340. DOI: https://doi.org/10.1109/ICCNC.2013.6504105
A. Banks and R. Gupta, "MQTT Version 3.1. 1," OASIS Standard, 2014.
U. Hunkeler, H. L. Truong and A. Stanford-Clark, "MQTT-S—A publish/subscribe protocol for wireless sensor networks," in Communication Systems Software and Middleware and Workshops, 2008. Comsware 2008. 3rd International Conference On, 2008, pp. 791-798. DOI: https://doi.org/10.1109/COMSWA.2008.4554519
ITU-T, "X.800 Recommendation," 1991.
CNSS, "Instruction No.4009," 26 April, 2010.
E. Rescorla, SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Reading, 2001.
N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "Analyzing the energy consumption of security protocols," in Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, pp. 30-35. DOI: https://doi.org/10.1145/871506.871518
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS constraints," in Communications, 2002. ICC 2002. IEEE International Conference On, 2002, pp. 2053-2057.
How to Cite
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.