Smart city services are enabled by a massive use of Internet of Things (IoT) technologies. The huge amount of sensors, and terminals with a great variety of typologies and applications, requires a secure way to manage them. Capillary networks can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic, and are enablers for smart city services. They can include both IP and non-IP devices, and security can become an issue, especially when simple unidirectional communication devices are considered. The main goal of this paper is to analyze security aspects in IoT capillary networks including unidirectional and bidirectional IP or non-IP devices. We propose an algorithm for secure access for uni- and bi-directional devices. The security procedure is based on a secure key renewal (without any exchange in air), considering a local clock time and a time interval of key validity. Following previous work in 2014 by Giuliano et al., in this paper we assess the duration of the validity of the time window, and present extended simulation results in terms of (average) transmission time in a realistic scenario, i.e., including the presence of disturber(s), then providing indications for the setting of the duration of the key validity time window. Finally, we present the benchmark analysis in order to assess the effectiveness of our approach with respect to other existing standards, as well as the security analysis in terms of typical attacks.

Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.m. (2017). Security access protocols in IoT capillary networks. IEEE INTERNET OF THINGS JOURNAL, 4(3), 645-657 [10.1109/JIOT.2016.2624824].

Security access protocols in IoT capillary networks

Giuliano, Romeo;Mazzenga, Franco;
2017-06-01

Abstract

Smart city services are enabled by a massive use of Internet of Things (IoT) technologies. The huge amount of sensors, and terminals with a great variety of typologies and applications, requires a secure way to manage them. Capillary networks can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic, and are enablers for smart city services. They can include both IP and non-IP devices, and security can become an issue, especially when simple unidirectional communication devices are considered. The main goal of this paper is to analyze security aspects in IoT capillary networks including unidirectional and bidirectional IP or non-IP devices. We propose an algorithm for secure access for uni- and bi-directional devices. The security procedure is based on a secure key renewal (without any exchange in air), considering a local clock time and a time interval of key validity. Following previous work in 2014 by Giuliano et al., in this paper we assess the duration of the validity of the time window, and present extended simulation results in terms of (average) transmission time in a realistic scenario, i.e., including the presence of disturber(s), then providing indications for the setting of the duration of the key validity time window. Finally, we present the benchmark analysis in order to assess the effectiveness of our approach with respect to other existing standards, as well as the security analysis in terms of typical attacks.
giu-2017
Pubblicato
Rilevanza internazionale
Articolo
Esperti anonimi
Settore ING-INF/03 - TELECOMUNICAZIONI
English
Bidirectional/unidirectional data transmissions; Communication system security; Internet-of-Things (IoT); Signal Processing; Information Systems; Hardware and Architecture; Computer Science Applications1707 Computer Vision and Pattern Recognition; Computer Networks and Communications
http://ieeexplore.ieee.org/servlet/opac?punumber=6488907
Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.m. (2017). Security access protocols in IoT capillary networks. IEEE INTERNET OF THINGS JOURNAL, 4(3), 645-657 [10.1109/JIOT.2016.2624824].
Giuliano, R; Mazzenga, F; Neri, A; Vegni, Am
Articolo su rivista
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/211629
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 60
  • ???jsp.display-item.citation.isi??? 33
social impact