Securing RPL-based Internet of Things applied for water pipeline monitoring

Manel Elleuchi, Manel Boujeleben, M. Abid, M. BenSaleh
{"title":"Securing RPL-based Internet of Things applied for water pipeline monitoring","authors":"Manel Elleuchi, Manel Boujeleben, M. Abid, M. BenSaleh","doi":"10.23919/SOFTCOM.2017.8115580","DOIUrl":null,"url":null,"abstract":"In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the level of security in IoT applications. The majority of these applications are based on RPL as a routing protocol. RPL should have unmodified routing data to ensure integrity, and verify that routing data comes from authorized machines to validate the authenticity. In this paper, we propose a security scheme applied to RPL-based internet of things routing protocol. It is based on identity-based cryptography to distribute symmetric keys between communicating nodes, AES128 and SHA 256 to compute message authentication codes. As application, we consider the water pipeline monitoring while maintaining low power consumption. For simulation and performance evaluation, we use CONTIKI operating system and the simulation tool Cooja. We demonstrate that our scheme is lightweight and does not introduce high memory and energy overheads. Then, constrained IoT devices can support it while avoiding many routing attacks.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/SOFTCOM.2017.8115580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the level of security in IoT applications. The majority of these applications are based on RPL as a routing protocol. RPL should have unmodified routing data to ensure integrity, and verify that routing data comes from authorized machines to validate the authenticity. In this paper, we propose a security scheme applied to RPL-based internet of things routing protocol. It is based on identity-based cryptography to distribute symmetric keys between communicating nodes, AES128 and SHA 256 to compute message authentication codes. As application, we consider the water pipeline monitoring while maintaining low power consumption. For simulation and performance evaluation, we use CONTIKI operating system and the simulation tool Cooja. We demonstrate that our scheme is lightweight and does not introduce high memory and energy overheads. Then, constrained IoT devices can support it while avoiding many routing attacks.
确保基于rpl的物联网应用于供水管道监测
近年来,由于近年来技术的进步,物联网引起了全世界的关注。物联网(IoT)的主要动机是使世界上的设备通过互联网连接起来,使它们能够自动共享信息。然而,也出现了许多安全问题。因此,大量的研究工作就是提出提高物联网应用安全水平的解决方案。这些应用程序中的大多数都基于RPL作为路由协议。RPL应该有未修改的路由数据,以确保完整性,并验证路由数据来自授权的机器,以验证真实性。本文提出了一种应用于基于rpl的物联网路由协议的安全方案。它基于基于身份的密码学在通信节点之间分发对称密钥,采用AES128和SHA 256计算消息认证码。在实际应用中,我们考虑了在保持低功耗的同时对输水管道进行监控。在仿真和性能评估方面,我们使用了CONTIKI操作系统和仿真工具Cooja。我们证明了我们的方案是轻量级的,并且不会引入高内存和能量开销。然后,受限的物联网设备可以支持它,同时避免许多路由攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信