DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS

Authors

  • Tae-Ho Cho Department of Information and Communication Engineering, SungKyunKwan University, Republic of Korea
  • Garam-Moe Jeon Department of Information and Communication Engineering, SungKyunKwan University, Republic of Korea

DOI:

https://doi.org/10.29121/granthaalayah.v4.i2.2016.2825

Keywords:

IoT, Femtocell, Man in the Middle, Interlock Protocol, Forced Latency Interlock Protocol

Abstract [English]

Most devices in the Internet of Things (IoT) utilize WiMAX communication, and Femtocells are used to provide reliable communication by eliminating shaded areas where wireless signals become weaker with distance and underground facilities. One downfall of this method is the possibility of eavesdropping through Man-in-the-Middle attacks. Forced latency interlock protocol is used to detect these attacks. This protocol uses a fixed latency value and does not consider packet size and distance. In this paper, we propose a dynamic delay time decision method for reducing the fixed delay time of the forced latency interlock protocol in wireless communications based on the IoT. The evaluation function considers the distance between the device, the packet size, and the bit rate of the broadband internet. The simulation experiments demonstrate the validity of our method, which reduces delay time by an average of 88.19% and increases detection rate by an average of 7.97%.

Downloads

Download data is not yet available.

References

K. Scarfone, C. Tibbs and M. Sexton, "Guide to securing WiMAX wireless communications," NIST Special Publication, vol. 800, pp. 127, 2010. DOI: https://doi.org/10.6028/NIST.SP.800-127

V. Chandrasekhar, J. G. Andrews and A. Gatherer, "Femtocell networks: a survey," Communications Magazine, IEEE, vol. 46, pp. 59-67, 2008. DOI: https://doi.org/10.1109/MCOM.2008.4623708

R. Y. Kim, J. S. Kwak and K. Etemad, "WiMAX femtocell: requirements, challenges, and solutions," Communications Magazine, IEEE, vol. 47, pp. 84-91, 2009. DOI: https://doi.org/10.1109/MCOM.2009.5277460

R. L. Rivest and A. Shamir, "How to expose an eavesdropper," Commun ACM, vol. 27, pp. 393-394, 1984. DOI: https://doi.org/10.1145/358027.358053

S. M. Bellovin and M. Merritt, "An attack on the interlock protocol when used for authentication," Information Theory, IEEE Transactions On, vol. 40, pp. 273-275, 1994. DOI: https://doi.org/10.1109/18.272497

Interlock Protocol. Available: https://en.wikipedia.org/wiki/Interlock_protocol.

Forced-Latency Interlock Protocol. Available: http://www.liquisearch.com/interlock_protocol/forced-latency_interlock_protocol.

Forced-Latency Interlock Protocol. Available: http://www.cisa.umbc.edu/papers/theses/newton-thesis-2010.pdf.

B. Forouzan, C. Coombs and S. C. Fegan, Introduction to Data Communications and Networking. McGraw-Hill, Inc., 1997.

J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach. Addison-Wesley, 2007.

Downloads

Published

2016-02-29

How to Cite

Cho, T.-H., & Jeon, G.-M. (2016). DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS. International Journal of Research -GRANTHAALAYAH, 4(2), 151–158. https://doi.org/10.29121/granthaalayah.v4.i2.2016.2825