Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.6.1309

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices  

Kim, Hee-jeong (University of Science and Technology)
Kim, Jeong Nyeo (Electronics and Telecommunications Research Institute)
Abstract
Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.
Keywords
Lightweight cipher; MQTT; End-to-End Message Security Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 MSIP, "The internet of things (IoT) information protection roadmap," Ministry of Science ICT and Future Planning, Oct. 2014.
2 Rob van der Meulen, "Gartner says 8.4 billion connected 'Things' will be in use in 2017, up 31 percent from 2016," Gartner, Feb. 2017.
3 Brussels Center/KBA Europe, "Application and development prospects of 'Internet of Things (IoT)' in industry sector," BMI, May. 2017.
4 Chris Middleton, "Gartner: IoT security spend hitting $1.5 billion - but strategy poor," Internet of Business, Mar. 2018.
5 Namseoul University, "In the 'Internet of Things', a research of actual cases and analysis of factors infringing privacy," Personal Information Protection Commission, Dec. 2015.
6 Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, Shiuhpyng Shieh, and IEEE Fellow, "IoT security: ongoing challenges and research opportunities," 2014 IEEE 7th International Conference on IEEE, pp. 230-234, Nov. 2014.
7 T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," NWG RFC 5246, Aug. 2008.
8 TLS protocol stack, https://commons.wikimedia.org/wiki/File:TLS_protocol_stack.jpg
9 About cipher suite of TLS, https://rsec.kr/?p=455
10 E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2," IETF RFC 6347, Jan. 2012.
11 Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., and Wehrle, K., "Security Challenges in the IP-based Internet of Things," Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, Dec. 2011.   DOI
12 ISO/IEC, "Information technology -- Message Queuing Telemetry Transport (MQTT) v3.1.1," ISO/IEC 20922:2016, Jun. 2016.
13 Facebook messanger using MQTT, https://d2.naver.com/helloworld/1846
14 Andrew Banks and Rahul Gupta, "MQTT Version 3.1.1 Plus Errata 01," OASIS Standard Incorporating Approved Errata 01, Dec. 2015.
15 Zach Shelby, Klaus Hartke, and Carsten Bormann, "The Constrained Application Protocol (CoAP)," IETF RFC 7252, Jun. 2014.
16 Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., and Wingers, L., "The SIMON and SPECK lightweight block ciphers," Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE, pp. 1-6, Jun. 2015.
17 K. Maletsky, "RSA vs ECC Comparison for Embedded Systems," Security ICs White Paper, 2015.