TY - JOUR
T1 - A Lightweight and Secure Communication Protocol for the IoT Environment
AU - Ding, Zikang
AU - He, Daojing
AU - Qiao, Qi
AU - Li, Xuru
AU - Gao, Yun
AU - Chan, Sammy
AU - Choo, Kim-Kwang Raymond
PY - 2024/5
Y1 - 2024/5
N2 - Ensuring secure communications for the Internet of Things (IoT) systems remains a challenge. Due to exacting resource limitations of computing, memory, and communication in IoT environments, communication schemes based on asymmetric cryptographic systems can be challenging to deploy. An alternative is to deploy symmetric encryption schemes based on pre-shared keys. However, there are also challenges in designing such schemes and examples include how to achieve an optimal trade-off between security and performance levels while meeting resource consumption requirements. Hence, this paper presents a lightweight key synchronization update algorithm, which is then used as a building block in our proposed lightweight secure communication protocol. The security of the protocol is analyzed to show that it can resist common attacks, such as replay attacks, and man-in-the-middle attacks. We then use Tamarin, a widely accepted security protocol verification tool, for formal verification. In addition, we evaluate the randomness and computational performance of the lightweight key synchronization update algorithm and demonstrate that it outperforms other schemes. We also evaluate the performance of the protocol, in terms of computational and communication costs, to demonstrate utility. © 2023 IEEE.
AB - Ensuring secure communications for the Internet of Things (IoT) systems remains a challenge. Due to exacting resource limitations of computing, memory, and communication in IoT environments, communication schemes based on asymmetric cryptographic systems can be challenging to deploy. An alternative is to deploy symmetric encryption schemes based on pre-shared keys. However, there are also challenges in designing such schemes and examples include how to achieve an optimal trade-off between security and performance levels while meeting resource consumption requirements. Hence, this paper presents a lightweight key synchronization update algorithm, which is then used as a building block in our proposed lightweight secure communication protocol. The security of the protocol is analyzed to show that it can resist common attacks, such as replay attacks, and man-in-the-middle attacks. We then use Tamarin, a widely accepted security protocol verification tool, for formal verification. In addition, we evaluate the randomness and computational performance of the lightweight key synchronization update algorithm and demonstrate that it outperforms other schemes. We also evaluate the performance of the protocol, in terms of computational and communication costs, to demonstrate utility. © 2023 IEEE.
KW - Encryption
KW - Generators
KW - Internet of Things
KW - Logistics
KW - network security
KW - Protocols
KW - secure communication protocol
KW - Security
KW - Synchronization
UR - http://www.scopus.com/inward/record.url?scp=85153797058&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85153797058&origin=recordpage
U2 - 10.1109/TDSC.2023.3267979
DO - 10.1109/TDSC.2023.3267979
M3 - RGC 21 - Publication in refereed journal
SN - 1545-5971
VL - 21
SP - 1050
EP - 1067
JO - IEEE Transactions on Dependable and Secure Computing
JF - IEEE Transactions on Dependable and Secure Computing
IS - 3
ER -