Browse > Article
http://dx.doi.org/10.17661/jkiiect.2021.14.1.98

Scheme of Secure IoT based Group communication  

Kim, Ki-Young (Dept. of Software Engineering, Seoil University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.14, no.1, 2021 , pp. 98-103 More about this Journal
Abstract
In this study, we propose a group communication technique that guarantees security and expandability by configuring a network consisting of IoT terminals equipped with security functions. As the number of devices participating in the network increases, network resources are proportionally reduced, and adding a security function to the IoT device increases the delay time due to encryption in the IoT device. If the error rate that occurs in the network increases, network resources are quickly consumed due to retransmission. Therefore, IoT terminals are grouped to ensure scalability while supporting security, reducing the consumption of network resources even when the number of participating nodes increases, thus ensuring scalability. For the future implementation, the encryption method used in IoT terminals considered the standard of IEEE802.5.4, and the standardization trend was investigated and classified. The proposed method applies IoT devices that provide security functions of the IEEE802.5.4 standard to the group communication base to ensure reliability and scalability. In the performance evaluation, the effectiveness of the proposed method was confirmed by comparing the delay times when grouping IoT devices with security functions through simulation.
Keywords
Security; IoT; Scalability; IEEE802.15.4; Group Communication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Gyamfi, J. A. Ansere and L. Xu, "ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing," 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), Rome, Italy, pp. 149-154, 2019.
2 Jang-Won Kim, "A Study on Smart Door Lock using Internet of Things", Korea Information Electron Communication Technology Journal of Korea Institute of Information, Electronics, and Communication Technology 13(6), pp.539-544, 2020.
3 I. Yaqoob and al. Internet of Things Architecture: Recent Advances, Taxonomy, Req , IEEE Wireless Communications, vol. 24, no 3, pp. 10 16, 2017.   DOI
4 N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, Goals, RFC 4919, 2007.
5 ZigBee Alliance, ZigBee specification, pp. 344-346, 2006.
6 S. A. Kumar, "Security in Internet of Things: Challenges, Solutions and Future Directions", pp. 5772-578, 2016.
7 S. Chen, Z. Honggang and L. Xian, "Energy Group based Random Access Method for M2M Communications," 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Qingdao, pp. 1-5, 2018.
8 "IEEE Draft Standard for Low-Rate Wireless Networks Amendment Defining Support for Advanced Encryption Standard (AES)-256 Encryption and Security Extensions," in IEEE P802.15.4y/ D2, October 2020 , vol., no., pp.1-20, 2020.
9 K. Sarwar, S. Yongchareon and J. Yu, "Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, pp. 867-872, 2018.