End-to-end secure iot node provisioning

Ilker Yavuz*, Berna Ors

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

—Security of Internet of Things (IoT) has been one of the most critical topics since IoT devices took part in daily life. Due to resource constrained nature of IoT networks, meeting requirements of a secure infrastructure always becomes a challenge. The most prevalent method is to rely on conventional application layer protocols to secure IoT network traffic but due to IoT device capabilities, limited mobile network resources and battery powered structure of IoT nodes, most of them are not applicable in practice. Provisioning a new node into a running network also suffers from these challenges. In this study, we investigate whether pure algorithm based protocols can be used to solve secure provisioning of resource limited IoT devices problem. Trusted IoT node provisioning requires new node authentication, authorization for network credentials, secret key generation for data privacy, and distribution of secret keys. Besides that, key management for rejoining nodes should be considered due to mobility of IoT nodes. We propose an Elliptic Curve Cryptography (ECC) based solution to cover these security requirements. Our design environment has also ability to analyze power consumption of each node during node enabling into a secure network.

Original languageEnglish
Pages (from-to)341-346
Number of pages6
JournalJournal of Communications
Volume16
Issue number8
DOIs
Publication statusPublished - Aug 2021

Bibliographical note

Publisher Copyright:
© 2021 Journal of Communications.

Keywords

  • Bootstrapping
  • Contiki
  • COOJA
  • Digital signature
  • Elliptic Curve
  • IoT
  • Power
  • Powertrace
  • Provisioning
  • Public key cryptography
  • Security
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'End-to-end secure iot node provisioning'. Together they form a unique fingerprint.

Cite this