Next-generation wireless sensor networks comprise low-cost, power-constrained nodes with limited data transfer, memory, and computational abilities, forming the backbone of IoT deployments across diverse domains. IoT sensor nodes play a pivotal role in collecting and disseminating critical environmental data using protocols like MQTT. However, ensuring secure communication channels between nodes remains paramount, necessitating robust measures for authentication, confidentiality, and data integrity. This abstract introduces a secure mechanism tailored for next-gen wireless sensor networks, employing the MQTTS (MQTT over TLS) IoT protocol. The proposed mechanism aims to bolster network defenses against various attacks, including masquerade, man-in-the-middle, replay, password guessing, and denial-of-service attacks, ensuring the resilience and reliability of next-gen IoT deployments.
References
Akyildiz, Ian F., et al. "A survey on sensor networks." Communications magazine, IEEE 40.8 (2002): 102-114.
Ling, Chung-Huei, et al. "A Secure and Efficient One-time Password Authentication Scheme for WSN." International Journal of Network Security19.2 (2017): 177-181.
Tsuji, Takasuke, and Akihiro Shimizu. "One-time password authentication protocol against theft attacks." IEICE transactions on communications 87.3 (2004): 523-529.
Arampatzis, Th, John Lygeros, and Stamatis Manesis. "A survey of applications of wireless sensors and wireless sensor networks." Intelligent Control, 2005. Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation. IEEE, 2005.
Tsudik, Gene. "Message authentication with one-way hash functions." INFOCOM'92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 1992.
Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006).
Dogra, Heena, and Jyoti Kohli. "Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey." Indian Journal of Science and Technology 9.47 (2016).
Lamport, Leslie. "Password authentication with insecure communication."Communications of the ACM 24.11 (1981): 770-772.
SHABANA, K., FIDA, N., KHAN, F., JAN, S., REHMAN, M.. Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), North America, 5, jul. 2016.
Büsching and L. Wolf, "The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink," in IEEE Internet of Things Journal, vol. 2, no. 1, pp. 63-71, Feb. 2015.
P. Singh, M. Hussain and C. K. Raina, "Authentication of base station by HDFS using trust based model in WSN," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2016, pp. 1-5.
Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006).
Dogra, Heena, and Jyoti Kohli. "Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey." Indian Journal of Science and Technology 9.47 (2016).
Lamport, Leslie. "Password authentication with insecure communication."Communications of the ACM 24.11 (1981): 770-772.
SHABANA, K., FIDA, N., KHAN, F., JAN, S., REHMAN, M.. Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), North America, 5, jul. 2016.
Büsching and L. Wolf, "The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink," in IEEE Internet of Things Journal, vol. 2, no. 1, pp. 63-71, Feb. 2015.
P. Singh, M. Hussain and C. K. Raina, "Authentication of base station by HDFS using trust based model in WSN," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2016, pp. 1-5.
W. Choi and I. Y. Lee, "A key distribution system for user authentication using pairing-based in a WSN," 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-4.
S. S. Abd El dayem, M. R. M. Rizk and M. A. Mokhtar, "An efficient authentication protocol and key establishment in dynamic WSN," 2016 6th International Conference on Information Communication and Management (ICICM), Hatfield, 2016, pp. 178-182.
H. Moon, U. Iqbal and G. M. Bhat, "Light weight Authentication Framework for WSN," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 3099-3105.
P. Joshi, M. Verma and P. R. Verma, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN," 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2015, pp. 527-532.
P. Banerjee, T. Chatterjee and S. DasBit, "LoENA: Low-overhead encryption based node authentication in WSN," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, 2015, pp. 2126-2132.
Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet. A Lightweight IoT Security Protocol. 1st Cyber Security in Networking Conference (CSNet2017), Oct 2017, Rio de Janeiro, Brazil.
Armando, Alessandro, et al. "The AVISPA tool for theautomated validation of internet security protocols and applications." International conference on computer aided verification. Springer, Berlin, Heidelberg, 2005.
Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, and Ioannis D. Moscholios. "Securing the Internet of Things: Challenges, threats and solutions." Internet of Things 5 (2019): 41-70.
Ramotsoela, Daniel, Adnan Abu-Mahfouz, and Gerhard Hancke. "A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study." Sensors 18.8 (2018): 2491.
Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current status and open issues." 2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.
Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
Cerullo, Gianfranco, et al. "Iot and sensor networks security." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.
Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779.
Thakkar, Ankit, and Ritika Lohiya. "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28.4 (2021): 3211-3243.
Lin, Yun‐Wei, Yi‐Bing Lin, and Chun‐You Liu. "AItalk: a tutorial to implement AI as IoT devices." IET Networks 8.3 (2019): 195-202.