Abstract
Heterogeneous devices are connected with each other through wireless links within a cyber physical system. These devices undergo resource constraints such as battery, bandwidth, memory and computing power. Moreover, the massive interconnections of these devices result in network latency and reduced speed. Edge computing offers a solution to this problem in which devices transmit the preprocessed actionable data in a formal way, resulting in reduced data traffic and improved speed. However, to provide the same level of security to each piece of information is not feasible due to limited resources. In addition, not all the data generated by Internet of things devices require a high level of security. Context-awareness principles can be employed to select an optimal algorithm based on device specifications and required information confidentiality level. For context-awareness, it is essential to consider the dynamic requirements of data confidentiality as well as device available resources. This paper presents a context-aware encryption protocol suite that selects optimal encryption algorithm according to device specifications and the level of data confidentiality. The results presented herein clearly exhibit that the devices were able to save 79% memory consumption, 56% battery consumption and 68% execution time by employing the proposed context-aware encryption protocol suite.
Similar content being viewed by others
References
Ashton K (2009) That ‘Internet of things’ thing. RFID J 22(7):97–114
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660
Hou L, Zhao S, Xiong X, Zheng K, Chatzimisios P, Hossain MS, Xiang W (2016) Internet of things cloud: architecture and implementation. IEEE Commun Mag 54(12):32–39
Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology (FIT). IEEE, pp 257–260
Hennebert C, Dos SJ (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398
Liu CH, Sheng Z, Leung VC, Moreno W, Leung KK, Yürür Ö (2016) Context-awareness for mobile sensing: a survey and future directions. IEEE Commun Surv Tutor 18(1):68–93
Roselin AG, Nanda P, Nepal S (2017) Lightweight authentication protocol (LAUP) for 6LoWPAN wireless sensor networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, pp 371–378
Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) “Learning internet-of-things security” hands-on. IEEE Secur Priv 14(1):37–46
Su X, Li P, Li Y, Flores H, Riekki J, Prehofer C (2016) Towards semantic reasoning on the edge of IoT systems. In: Proceedings of the 6th International Conference on the Internet of Things, pp 171–172
Gu B, Zhou Z, Mumtaz S, Frascolla V, Bashir AK (2018) Context-aware task offloading for multi-access edge computing: matching with externalities. In: IEEE Globecom
Yaqoob I, Ahmed E, ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444–458
Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IAT, Siddiqa A, Yaqoob I (2017) Big IoT data analytics: architecture, opportunities, and open research challenges. IEEE Access 5:5247–5261
Bansod G, Patil A, Sutar S, Pisharoty N (2016) ANU: an ultra-lightweight cipher design for security in IoT. Secur Commun Netw 9(18):5238–5251
Siddiqui IF, Qureshi NMF, Shaikh MA, Chowdhry BS, Abbas A, Bashir AK, Lee SUJ (2018) Stuck-at fault analytics of IoT devices using knowledge-based data processing strategy in smart grid. Wireless personal communications. Springer, Berlin
Riker A, Curado M, Monteiro E (2017) Neutral operation of the minimum energy node in energy-harvesting environments. In 2017 IEEE Symposium on Computers and Communication (ISCC), pp 1–6
Adrianto D, Lin FJ (2015) Analysis of security protocols and corresponding cipher suites in ETSI M2M standards. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, pp 777–782
Mohammadian M, Hatzinakos D (2009) Data classification process for security and privacy based on a fuzzy logic classifier. Int J Electron Finance 3(4):374–386
Perera C, Vasilakos AV (2016) A knowledge-based resource discovery for Internet of things. Knowl-Based Syst 109:122–136
Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutor 16:414–454
Kao Y-W, Yuan S-M (2012) User-configurable semantic home automation. Comput Stand Interfaces 34(1):171–188
Zhou Q, Natarajan S, Simmhan Y, Prasanna V (2012) Semantic information modeling for emerging applications in smart grid. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, pp 775–782
Taylor K, Griffith C, Lefort L, Gaire R, Compton M, Wark T, Lamb D, Falzon G, Trotter M (2013) Farming the web of things. IEEE Intell Syst 28(6):12–19
Hristoskova A, Sakkalis V, Zacharioudakis G, Tsiknakis M, De Turck F (2014) Ontology-driven monitoring of patient’s vital signs enabling personalized medical detection and alert. Sensors 14(1):1598–1628
Preist C, Esplugas-Cuadrado J, Battle SA, Grimm S, Williams SK (2005) Automated business-to-business integration of a logistics supply chain using semantic web services technology. In: International Semantic Web Conference. Springer, pp 987–1001
Medaglia CM, Serbanati A (2010) An overview of privacy and security issues in the Internet of things. In: The Internet of things. Springer, pp 389–395
Messer A, Greenberg I, Bernadat P, Milojicic D, Chen D, Giuli TJ, Gu X (2002) Towards a distributed platform for resource-constrained devices. In: 2002 Proceedings of 22nd International Conference on Distributed Computing Systems. IEEE, pp 43–51
Hofer T, Schwinger W, Pichler M, Leonhartsberger G, Altmann J, Retschitzegger W (2003) Context-awareness on mobile devices-the hydrogen approach. In: 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences. IEEE, p 10
Lum WY, Lau FC (2002) A context-aware decision engine for content adaptation. IEEE Pervasive Comput 1(3):41–49
Taneja M, Davy A (2017) Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, pp 1222–1228
Sathyamoorthy P, Ngai EC-H, Hu X, Leung V (2017) Profiling energy efficiency and data communications for mobile Internet of things. Wirel Commun Mobile Comput 2017:1–15 (Article ID 6562915)
Suo H, Wan J, Zou C, Liu J (2012) Security in the Internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol 3. IEEE, pp 648–651
Musaddiq A, Zikriya YB, Hahm O, Yu HJ, Bashir AK, Kim SW (2018) A survey on resource management in IoT operating systems. IEEE Access 6:8459–8482
Zardari MA, Jung LT (2016) Data security rules/regulations based classification of file data using TsF-kNN algorithm. Clust Comput 19(1):349–368
Zardari MA, Jung LT, Zakaria MNB (2014) Data classification based on confidentiality in virtual Cloud environment. Res J Appl Sci Eng Technol 8(13):1498–1509
Safi A (2017) Improving the security of Internet of things using encryption algorithms. World Acad Sci Eng Technol Int J Comput Electr Autom Control Inf Eng 11(5):546–549
Wu X-W, Yang E-H, Wang J (2017) Lightweight security protocols for the Internet of things. In 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, pp 1–7
Hamad F, Smalov L, James A (2009) Energy-aware Security in M-Commerce and the Internet of things. IETE Tech Rev 26(5):357–362
Glissa G, Meddeb A (2017) IEEE 802.15. 4 security sublayer for OMNET++. IEEE, pp 1891–1896
Toldinas J, Damasevicius R, Venckauskas A, Blazauskas T, Ceponis J (2014) Energy consumption of cryptographic algorithms in mobile devices. Elektron Elektrotech 20(5):158–161
Khan SU, Pastrone C, Lavagno L, Spirito MA (2012) An authentication and key establishment scheme for the IP-based wireless sensor networks. Procedia Comput Sci 10:1039–1045
Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks. IEEE Computer Society, pp 245–256
Szczechowiak P, Oliveira LB, Scott M, Collier M, Dahab R (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Wireless Sensor Networks. Springer, pp 305–320
Matthias C, Kris S, An B, Ruben S, Nele M, Kris A (2015) Study on impact of adding security in a 6LoWPAN based network. In: 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, pp 577–584
Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the Internet of things—a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7:2654–2668
Jung W, Hong S, Ha M, Kim Y-J, Kim D (2009) SSL-based lightweight security of IP-based wireless sensor networks. In: WAINA’09. International Conference on Advanced Information Networking and Applications Workshops, 2009. IEEE, pp 1112–1117
Mathur M, Kesarwani A (2013) Comparison between Des, 3des, Rc2, Rc6, Blowfish And Aes. In: Proceedings of National Conference on New Horizons in IT-NCNHIT, pp 143–148
Ebrahim M, Khan S, Khalid UB (2013) Symmetric algorithm survey: a comparative analysis. Int J Comput Appl 61(20):0975–8887
Tripathi R, Agrawal S (2014) Comparative study of symmetric and asymmetric cryptography techniques. Int J Adv Found Res Comput: IJAFRC 1(6):68–76
Nie T, Song C, Zhi X (2014) Performance evaluation of DES and Blowfish algorithms. In: 2010 International Conference on Biomedical Engineering and Computer Science (ICBECS). IEEE, pp 1–4
Verma HK, Singh RK (2012) Performance analysis of RC5, Blowfish and DES block cipher algorithms. Int J Comput Appl 42(16):8–14
Agrawal M, Mishra P (2012) A comparative survey on symmetric key encryption techniques. Int J Comput Sci Eng 4(5):877
Kumar A, Gopal K, Aggarwal A (2014) Simulation and analysis of authentication protocols for mobile Internet of things (MIoT). In: 2014 International Conference on PDGC. IEEE, pp 423–428
Brambilla G, Picone M, Cirani S, Amoretti M, Zanichelli F (2014) A simulation platform for large-scale Internet of things scenarios in urban environments. In: Proceedings of the First International Conference on IoT in Urban Space. ICST, pp 50–55
Prasad SR, Vivek R, Mungara J (2016) NS3 simulation studies for optimized neighbour discovery in 6LoWPAN networks. IEEE, pp 15–18
D’Angelo G, Ferretti S, Ghini V (2016) Simulation of the Internet of things. In: 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, pp 1–8
Talpur MSH, Bhuiyan MZA, Wang G (2014) Shared–node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. Int J Embedded Syst 7(1):43–54
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dar, Z., Ahmad, A., Khan, F.A. et al. A context-aware encryption protocol suite for edge computing-based IoT devices. J Supercomput 76, 2548–2567 (2020). https://doi.org/10.1007/s11227-019-03021-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-03021-2