{"title":"Energy–Aware security protocol for IoT devices","authors":"Malak Barari, Ramzi Saifan","doi":"10.1016/j.pmcj.2023.101847","DOIUrl":null,"url":null,"abstract":"<div><p><span>Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT, including security. To address this issue, we present an adaptive security approach in this paper. Adaptive security involves adjusting the </span>security level<span> based on the level of threats and data context, rather than always assuming the worst-case scenario. This approach reduces energy consumption and is implemented in three parts: 1) Adapting the length of RSA public and private keys, where longer keys provide more security but consume more power. 2) Adapting the trust level between nodes based on the history of the transmitting node, where the receiving node decides whether to verify the correctness of the received messages or not. 3) Utilizing TrustChain, which is transactional verification method inspired<span> by the blockchain concept.</span></span></p><p>We evaluated the performance of our proposed model through exhaustive simulation scenarios and experiments. Our approach outperforms state-of-the-art methods, with the variable key length approach reducing energy consumption by 50%, the trust level approach reducing energy consumption by approximately 50%, and the TrustChain approach reducing energy consumption to 0.771 J, while the blockchain-based method consumed 2.955 J to verify transactions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101847"},"PeriodicalIF":3.0000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pervasive and Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574119223001050","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT, including security. To address this issue, we present an adaptive security approach in this paper. Adaptive security involves adjusting the security level based on the level of threats and data context, rather than always assuming the worst-case scenario. This approach reduces energy consumption and is implemented in three parts: 1) Adapting the length of RSA public and private keys, where longer keys provide more security but consume more power. 2) Adapting the trust level between nodes based on the history of the transmitting node, where the receiving node decides whether to verify the correctness of the received messages or not. 3) Utilizing TrustChain, which is transactional verification method inspired by the blockchain concept.
We evaluated the performance of our proposed model through exhaustive simulation scenarios and experiments. Our approach outperforms state-of-the-art methods, with the variable key length approach reducing energy consumption by 50%, the trust level approach reducing energy consumption by approximately 50%, and the TrustChain approach reducing energy consumption to 0.771 J, while the blockchain-based method consumed 2.955 J to verify transactions.
期刊介绍:
As envisioned by Mark Weiser as early as 1991, pervasive computing systems and services have truly become integral parts of our daily lives. Tremendous developments in a multitude of technologies ranging from personalized and embedded smart devices (e.g., smartphones, sensors, wearables, IoTs, etc.) to ubiquitous connectivity, via a variety of wireless mobile communications and cognitive networking infrastructures, to advanced computing techniques (including edge, fog and cloud) and user-friendly middleware services and platforms have significantly contributed to the unprecedented advances in pervasive and mobile computing. Cutting-edge applications and paradigms have evolved, such as cyber-physical systems and smart environments (e.g., smart city, smart energy, smart transportation, smart healthcare, etc.) that also involve human in the loop through social interactions and participatory and/or mobile crowd sensing, for example. The goal of pervasive computing systems is to improve human experience and quality of life, without explicit awareness of the underlying communications and computing technologies.
The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems.