Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.3.661

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network  

Chung, Jin Hee (Department of Information and Communication Engineering, Sungkyunkwan University)
Cho, Tae Ho (Department of Information and Communication Engineering, Sungkyunkwan University)
Abstract
The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.
Keywords
Internet of things; security service; SSL/TLS; IoT security; MQTT; fuzzy logic;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667, 2013.
2 A. Banks and R. Gupta, "MQTT Version 3.1.1," OASIS Standard, 2014.
3 E. Rescorla, SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Reading, 2001.
4 IoT Forum, "The Classification and Security Requirements based on IoT Device Capabilities," IoTFS-0081, 12.1, 2015.
5 T. Dierks, "The transport layer security (TLS) protocol version 1.2," 2008.
6 J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998.
7 R. Babuska, "Fuzzy Systems, Modeling and Identification," Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg, vol. 4, 1996.
8 N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," Mobile Computing, IEEE Transactions on, vol. 5, pp. 128-143, 2006.   DOI
9 R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS constraints," in Communications, 2002. ICC 2002. IEEE International Conference on, 2002, pp. 2053-2057, 2002.