Secure Channel Communication between IOT Devices and Computers
- 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 303
Secure Channel Communication between IOT Devices and Computers
Harsha Kata, Harshith Singathala, Swarag Narayansetty, Sairam Reddy, Jyotsna Malla, Rishita
Konda
1Harsha Kata, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014,
Tamil Nadu, India
2Harshith Singathala, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore –
632014, Tamil Nadu, India
3Swarag Narayansetty, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore –
632014, Tamil Nadu, India
4Sairam Reddy, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014,
Tamil Nadu, India
5Jyotsna Malla, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014,
Tamil Nadu, India
6Rishita Konda, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore – 632014,
Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The proliferation of Internet of Things (IoT)
devices and applications is on the rise, resulting in an increase
in both the quantity and complexity of malicious attacks. It is
imperative to establish robust security measures for IoT
networks to counteract malicious attacks, particularly with
the aim of preventing unauthorized controloverthesedevices.
While numerous security solutions for IoT havebeenproposed
in recent years, a significant portion of them lacks
standardization and interoperability. As the IoT landscape
continues to expand, the diversity and intricacy of IoT
applications also grow, renderingsuch networkssusceptibleto
attacks aimed at data theft, device takeover, and service
disruption.
A multitude of protocols and networking frameworks have
been developed for IoT, with some achieving standardization
and facilitating interoperability among devices and internet
connectivity. These protocols have receivedendorsementfrom
prominent standardization bodies such as IETF, IEEE, and
industry consortia like the Rawan coalition and thread group.
This paper's objective is to present a model that establishes
secure communication channels among IoT devices as well as
between these devices and a server or router, accomplished
through the implementation of encryption algorithms. The
popularity of smart home IoT systems is increasing due to
their efficiency in simplifying various tasks. However, this
trend also introduces vulnerabilities in terms of user privacy.
Safeguarding the privacy of personal data remains a
paramount concern for electronic services. To address this
challenge, we employ well-established encryption algorithms
such as RSA to create and utilize secure communication
channels through Socket Programming for IoT devices.
Key Words: —IoT devices, encryption algorithms, RSA,
socket programming, communication channels, SHA256,
cyber attacks, cybersecurity, communication protocols,
cryptography
1.INTRODUCTION
Lately, there has been a significant surge of interest in the
concept of the Internet of Things (IoT), capturing the
attention of both the industrial sector and academic circles
alike. Within the realm of IoT, an immense array of objects
equipped with sensors are tasked with amassing data,
subsequently transmittingthisinformationtoserversforthe
purpose of analysis, management, and utilization. The
ultimate goal is to construct intelligent systems such as
smart grids, sophisticated transportation networks,
healthcare systems, and even entire smart cities [1], [2], [3].
Due to the prevailing tendency of relegating IoT security
to a secondary concern, maliciousactorscommonlyperceive
smart devices as easily accessible targets, akin to "low-
hanging fruit," susceptible to compromise and manipulation.
The significance of prioritizing security, along with the
inherent need forprivacy,cannotbeoverstatedinthecontext
of IoT. The most reliable and effective approach for ensuring
the protection of communication in smart devices is through
encryption. Regrettably, striking a balance between
convenience and security remains a formidable challenge,
particularly whendealingwithresource-constraineddevices.
As a result, numerous IoT products incorporate encryption
features that are either ineffective, providing a false sense of
security for communications and stored data, or they lack
such features entirely [4].
Reported in a 2020 publication by Unit 42, a threat
intelligence team, an astounding 98% of the 1.2 million IoT
devices scrutinized across corporate networks exhibited a
- 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 304
significantdeficiency:theabsenceofencryptioncapabilityfor
their network traffic. This critical shortcoming led to a
vulnerability where 57% of these IoT devices became
susceptible to potential threats, including unauthorized
interception and manipulation of their data traffic. The same
comprehensive report also shed light on the hazardous
consequences of amalgamating IoT and IT assets within a
Virtual Local Area Network (VLAN). This practice, as
elucidated in the report, could result in compromised IoT
devices owned by employees inadvertently disseminating
malware throughout the entirety of the corporate network
[5], [6].
In the proposed model, we have incorporated MongoDB
for authentication purposes.Additionally,withinthisproject,
the utilization of the SHA256algorithmforpasswordhashing
has been employed. This approach ensures that even
individuals overseeing the database cannot ascertain the
actual password, as it is stored in a hashed form.Thesecurity
of SHA-256 rests upon three key properties:
1. Resistance to Reverse Engineering: Foremost, it is
exceedingly arduous to reverse engineer the original
data from itscorresponding hash value. Abruteforce
attack, attempting to deduce the original data, would
necessitate an astronomical 2^256 attempts. This
level of computational infeasibility provides robust
protection.
2. Collision Resistance: The likelihood of encountering
two distinct messagesproducingthesamehashvalue
(referred to as a collision) is incredibly remote. With
a vast 2^256 range of potential hash values,
surpassing the count of particles in the observable
universe, the probability of encountering two
identical hash values is infinitesimal.
3. Avalanche Effect: Lastly, even a minor alteration to
the initial data precipitates asignificantchangeinthe
hash value, rendering it virtually impossible to
discern that the new hash value is derived from
similar data. This phenomenon is termed the
"avalanche effect," further enhancing the security of
the hash.
These properties collectivelycontributetotherobustness
and security of the SHA-256 algorithm, making it a prudent
choice for protecting sensitive data within our project.
The remaining part of the paper is organized as follows.
Section 2 containstheLiteratureSurvey.TheProposedModel
is discussed in Section 3. Section 4 contains the Experiments
and Results. Lastly, the Conclusion and Future Directions is
presented in Section 5.
2. LITERATURE REVIEW
The Internet of Things (IoT) has the potential to
revolutionize numerous aspects of our daily routines and
behaviors. With the pervasive nature of data sources, a
substantial amount of information encompassing nearly
every facet of human activity, whether public or private, will
be generated, transmitted, collected, stored, and processed.
As a result, ensuring the integrity and confidentiality of
transmitted data, along with verifying the authenticity of the
services providing that data, becomes paramount. This
underscores the critical importanceofsecuritywithintheIoT
framework.
Data networks,particularlywirelessones,aresusceptibletoa
wide array of attacks, including eavesdropping,
impersonation, denial of service, and more. Traditional
security measures employed in legacy Internet systems
mitigate these threats by relying on encryption and
authentication at various layers, including the interface,
network, transport, and application layers. While some of
these security solutions can be adapted for use in the IoT
domain, the inherent limitations in processing power and
communication capabilities of IoT devices hinder the
implementation of full-fledged security suites. [8].
Secure end-to-end communication channels are
achievable within the unconstrained network (UCN) domain
using advanced technologies like IPsec, SSL/TLS, or DTLS.
However, these technologies cannot be directly applied to
constrained network (CN) nodes due to their limitations in
memory space and processing power. To address these
challenges, this paper proposes a practical security
architecture for the Internet of Things (IoT) with the
following objectives:
1. Continued Use of UCN SecuritySuites: Existingsecurity
suites employed withinUCNswillremainunaltered,ensuring
compatibility with the UCN side.
2. Distinct Handling of InitialSecurity Handshakes:Initial
security handshakes and protocols are managed differently
within the CN to accommodate the constraints of limited
nodes. This enables the establishment of secure end-to-end
channels, allowing constrained devices to manage their
complexity effectively.
3. Unconstrained Nodes Remain Unaffected:
Unconstrained nodes continue to operate without any
deviation from their standard procedures.
The proposed solution revolves around offloading
computationally intensive tasks to a trusted unconstrained
node. This node assumes responsibility for calculating the
master session key on behalfof the limited IoT devicesunder
its jurisdiction. IoT Gateways, positioned at the interface
between UCN and CN, play a crucial role in mediating
communication betweenthesetwodomains.Thesegateways
- 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 305
often manage protocol layer variations, spanning physical
and interface layers, and even extending to the application
layer[13].
In spite of end to end security, lower layers may keep
utilizing heterogeneous security highlights across network
subspaces or for highlight point communication [14] , [18].
Recent advancements in semiconductor technology have
paved the way for cost-effective solutions to seamlessly
integrate wireless connectivity into embedded processors
and sensors. This, in turn, has sparked significant interest in
the Internet of Things (IoT), which involves the
interconnectednessofeverydayobjects.TheIoThasemerged
as a promising technology for the consumer electronics
market, with the realm of smart homes being particularly
highlighted. Smart homes hold immense potential for IoT
deployment, facilitating home automation and efficient
energy management. However, the rate at which IoT gains
traction among homeowners hinges on their willingness to
adopt these devices, and two primary factors influencing
their decision areconvenienceandsecurity.Toaddressthis,a
Wi-Fi-based IoT smart homesystemhasbeenconceptualized
and realized, utilizing a gateway to establish secure
communication among IoT devices. This gateway also
enables users to configure, access, and control the system
through an intuitive interface accessible from ubiquitous
mobile devices, such as smartphones [7], [9].Inter-device
communication is facilitated using the User Datagram
Protocol. Prior to transmission, data messages undergo
encryptionusingsymmetriccryptographytechniqueslikethe
Advanced Encryption Standard. The encryption employs a
shared key generated through the Elliptic Curve Diffie-
Hellman (ECDH) process [16].
The concept of the Internet of Things (IoT) revolves
around creating a network of extensively interconnected
devices, often referred to as "things." In the current context,
the IoT encompasses a wide range of device types, including
sensors, actuators, and RFID tags. These devices vary
significantly in terms of size,capabilities,and functionalities.
The central challenge lies in orchestrating this diverse
network to operate seamlessly within the framework of the
conventional Internet.
Motivated by this challenge, ongoing research endeavors
are focusedonadapting,applying,andtransformingstandard
Internet protocols for use within the IoT. The efforts of the
6LoWPAN working group have enabled even the smallest,
resource-constrained devices to becomeintegral partsofthe
Internet by enabling IP communication over these devices.
This exceptional featureempowers theconnectionofbillions
of devices to the Internet. For instance, a humidity sensor or
an RFID tag can communicate not only with each other but
also with a human using a smartphone or a remote backend
server.While the concept of the IoT may seem
straightforward,significantresearcheffortsarestillrequired.
Various aspects of the IoT are under investigation, including
itsapplicationsandarchitectures.Furthermore,anincreasing
number of research initiatives are being undertaken to
address challenges related to security, privacy, and trust as
IoT devices become more widespread [15], [18].
This study delved into a range of secure, lightweight, and
resilient solutions forWireless SensorNetworks(WSNs)and
the Internet of Things (IoT), addressing the distinct security
requirements and challenges inherent in these domains. We
introduced a novel classification of existing protocols based
on their key bootstrapping strategies, with the aim of
establishing secure communication. Through a
comprehensive analysis, we evaluated these protocols
against various criteria to identify their respective
advantages and limitations. Our findingssuggestadeparture
from the conventional reliance on symmetric approachesfor
IoT security. Public key cryptography, particularly
asymmetric methods, is emerging as a more viable option
within the IoT landscape, provided that these methods are
suitably optimized. Additionally, a trusted third party is
poised to assume a more active role in enhancing IoT
security, considering the heterogeneous nature of IoT
deployments.
Furthermore, it is imperative for security protocols to
account for the resource-constrained nature of IoT devices.
Cumbersome cryptographic operations like RSA and Diffie–
Hellman key exchange protocols must be substituted with
lightweight alternatives. For instance, the adoption of
symmetric cryptography or more streamlined asymmetric
algorithms such as ECC (Elliptic Curve Cryptography) and
NTRU can significantly improve efficiency. Lightweight
security protocols are also crucial in reducingthecomplexity
of communication processes [19], [20].
The realm of smart-home Internet of Things (IoT)
solutions is still in its infancy,and the factorofsecuritylooms
large, significantly influencing the rate of their adoption.
Designing a software security solution for smart-home
environments presents a challenge due to the lack of user
control over various elements. Additionally, integrating a
privacy solution into existing software frameworks while
considering user experience is another intricate task.
In this paper, we introduced an authorization scheme for
smart-home IoT devices that are connected to an untrusted
cloud framework. Furthermore, we presented a proof-of-
concept software solution that leverages the FIDO protocol,
enabling users to authenticate with their devices. We also
proposed several extensions and adaptations of the FIDO
protocol suitable for an IoT environment. The protocol we
introduced prioritizes user anonymity by ensuring that
manufacturers cannot establish alink betweendifferentuser
accounts. The most relevant user-related information
consists of the FIDO public key and a pseudonym.
Experimental results indicated that the additional delay
introduced by the FIDO authentication protocol has a
minimal impact on smart-homeapplications. Lookingahead,
- 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 306
our future efforts will focus on various directions. These
include testing the FIDO protocol with hardware
authenticators,enhancingthesecurityschemewithFIDOU2F
features (second-factor authentication), adapting the
software security stack for different hardwareplatformsand
programming languages, and proposing an IoT device
authentication scheme for smart homes using the privacy
concepts outlined in this paper[10],[11],[12].The user-to-
device connections, which form the foundation of our
scenario, consider the user-device-driven nature of the
security framework wepropose.Theauthorizationmessages
presented in this paper are secured through the FIDO
protocol, and unlocking the FIDO private key requires
biometric (fingerprint)authenticationontheuserdevice.The
user-to-device authentication relies on the Android security
framework and hardware security modules found in
smartphones, such as fingerprint readers or ARM TrustZone
[17].
3. PROPOSED MODEL
The vulnerabilitiespresentinIoTsystems,combinedwith
the potential interception and manipulation of
communications by hackers, pose a significant threat. This
can lead to inaccurate data reaching IoT devices, resulting in
malfunctions and erroneousoutcomes.Companiesrelyingon
IoT-derived data are exposed to risks, as manipulated data
traffic can undermine the accuracy and reliability of their
operations. To mitigate this, we have proposed the
implementation of encrypted communication messages
between IoT devices and clients, effectively thwarting the
ability of hackers to tamper with the traffic.
Our encryptionschemeoffersseveraldistinctadvantages:
a. ComprehensiveSecurity: Ourschemeachievesmultiple
security objectives in a single logical step, ensuring
confidentiality, integrity, authentication, non-repudiation,
and anonymity simultaneously.
b. Heterogeneous Compatibility: The scheme
accommodates the heterogeneity of IoT environments,
allowing a sensor nodeutilizing identity-basedcryptography
to transmit messages to a server employing a public key
infrastructure. This versatile compatibility renders our
scheme well-suited for secure data transmission within IoT
ecosystems.
By incorporating encryption into the communication
process between IoT devices and clients,weprovidearobust
defense against unauthorized tampering and manipulation,
enhancing the overall security and trustworthiness of IoT
systems.
Fig -1: Architecture Diagram of the proposed model
A. SOCKET PROGRAMMING
Communication between the IoT device and the
client is established through socket programming,
enabling a two-way exchange of messages between
these two entities. Sockets serve astheendpointsofa
bidirectional communication channel, allowing data
transmissionand reception.Thiscommunicationcan
occur within a single process, between processes on
the same machine, or even across processes on
geographically distant locations [22], [23].
The creation of a socket involves the following
step: s = socket.socket(socket_family, socket_type,
protocol=0).
For server-side operations, the following socket
methods are utilized:
1. s.bind():Thismethodassociatesthesocketwith
a specific address and port to listen for incoming
client connections.
2. s.listen(): It prepares the socket for accepting
incoming client connections.
3. s.accept(): This method accepts an incoming
client connection and returns a new socket object
representing the connection, along with the address
of the client.
On the client side, the primary method is:
1. s.connect(): This method establishes a
connection to the server, facilitating message
exchange and communication betweentheclientand
the server.
In summary, socket programming enables seamless
communication between IoT devices and clients
through a well-defined set of methods and
operations, allowing for the exchange of messages in
a bidirectional manner.
- 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 307
B. RSA ALGORITHM
To safeguard against potential attacks aimed at
intercepting and pilfering messages and data,
encryption becomes imperative. Encrypting
messages ensures that unauthorized access and
decryptionbyhackersbecomeformidablechallenges.
In our project, we employ the RSA algorithm for data
encryption—a robust asymmetric keycryptographic
algorithm rooted in public key encryption [21]. This
algorithm is renownedforitsformidablesecurityand
near-impossibilitytobreak.Inadditiontoencryption,
our proposed model encompasses an authentication
featureto validate users whose information isstored
in a database. Forthispurpose,weutilizeMongoDB,a
user-friendly and highly scalable database system.
MongoDB was chosen for its ease of use and
scalability. To enhance security, passwords entered
by clients are hashed before being stored in the
database, further fortifying the protective measures.
The design of our proposed model takes into
account resilience against various attacks:
1. Eavesdropping Attack: By encrypting the data,
we effectively thwart eavesdropping attempts,
making it extremely difficult for attackers to
comprehend the intercepted information.
2. Man-in-the-Middle Attack: The inclusion of
encryption and authentication mechanisms helps
mitigate the risk of man-in-the-middle attacks, as
unauthorized intermediaries would be unable to
deciphertheencryptedcommunicationorgainaccess
through authentication.
3. ARP Spoofing Attack: Our model incorporates
measures to counter ARP spoofing attacks, which
involve manipulation of network address resolution.
These precautions help maintain the integrity and
authenticity of communication channels.
In essence, our proposed model's combination of
encryption, authentication, password hashing, and
measures against specific attacks serves to enhance
the overall security and integrity of the IoT
communication framework.
4. EXPERIMENTS AND RESULTS
In our experimental setup, we establish the MongoDB
service to serve as the foundation for authentication within
the proposed model. The primary objective is to ensure
authorized access for making requests from clients to IoT
devices. To achieve this, we follow these steps:
1. Adding User to MongoDB: Users are added to
the MongoDB database to enable authorized
interactions. These usersaregrantedtheprivilegeof
sending authorized commands to IoT devices from
clients.
2. Data Storage in MongoDB: Relevant user data,
including login credentials, isstored securelywithin
the MongoDB database. Notably, passwords are
hashed to bolster security measures, safeguarding
sensitive information.
3. Connection and Login: When a connection
attempt is initiated,theclientispromptedtoprovide
login credentials. These credentials serve as
authentication for access to IoT devices.
4. Valid Credentials: Upon entering correct login
credentials, the user gains access to the IoT device
and is authorized to issue commands. This ensures
that only authenticated users can interact with the
IoT device.
5. Invalid Credentials: In cases of incorrect or
invalid credentials, access to the IoT device is
denied, preventing unauthorized users from
entering the system.
6. Encrypted Command Transmission: Any
command issued by an authorized user is encrypted
before transmission. This encrypted command is
then securely sent to the IoT device.
7. Decryption and Execution: Upon reaching the
IoT device,theencryptedcommandisdecryptedand
processed. The IoT device accurately interprets and
executes the decrypted commandasintendedbythe
authenticated user.
This experimentalsetupshowcasestheseamless
integration of MongoDB for user authentication,
secure storage, and hashed passwords. The
interaction between clients and IoT devices is
streamlined through encrypted command
transmission, ensuring that only authorized users
can access and control IoT devices. The process
reinforces the security, privacy,andoverallintegrity
of the proposed model.
Fig -2: Starting MongoDB
- 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 308
Fig -3: Development Environment
Fig -4: generateKeys.py
Fig -5: Generating RSA Public and Private Keys
Fig -6: hash.py
Fig -7: Adding an user
Fig -8: Data added to MongoDB
Fig -9: Login details given by the user
Fig -10: Client Server and IOT device run together
Fig -11: User is logged into IOT device
Fig -12: Encrypted command decrypted and read
- 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 309
9. CONCLUSIONS
Indeed, authentication and authorization are pivotal
components for ensuringthe securityandtrustworthinessof
IoT devices. In our project, we have taken a comprehensive
approach to address these aspects byimplementinga secure
channel communication protocol between IoT devices and
clients. To achieve this, we have harnessed the power of
several key concepts, including Socket Programming and
Cryptography.
The utilization of Socket Programming enables seamless
communication between IoT devices and clients, facilitating
the exchange of data and commands. On top of this
foundation, we have integrated robust cryptographic
measures to ensure the confidentiality and integrity of the
transmitted information. Particularly,theindustry-standard
RSA algorithm has been employed to encrypt commands
originating from the client devices to the IoT devices.
Our implementation also showcasesthesignificanceofusing
MongoDB as a database for authentication purposes.
MongoDB's popularity within the IoT developer community
makes it a suitable choice for integrating this secure
authenticationmechanismintomodernIoTapplications. The
database stores user credentials securely, and through
proper authentication and authorization procedures, only
authorized users gain access to the IoT devices.
The amalgamation of these elements—SocketProgramming,
Cryptography, and MongoDB—results in a comprehensive
and reliable framework that enhances the security and
functionality of IoT devices. By focusing on secure
communication, encryption, and properuserauthentication,
our project contributes to the advancement of IoT security
and paves the way for future innovations in this field.
REFERENCES
[1] Y. Lu and L. Da Xu, “Internet of Things (IoT)
Cybersecurity Research: A Review of Current Research
Topics,” IEEE Internet Things J., vol. 6, no. 2, pp. 2103–
2115, 2019, doi: 10.1109/JIOT.2018.2869847.
[2] P. D. Babu, C. Pavani, and C. E. Naidu, “Cyber Security
with IOT,” in 2019 Fifth International Conference on
Science Technology Engineering and Mathematics
(ICONSTEM), 2019, vol. 1, pp. 109–113, doi:
10.1109/ICONSTEM.2019.8918782.
[3] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H.
Janicke, “Edge-IIoTset: A New Comprehensive Realistic
Cyber Security Dataset of IoT and IIoT Applications for
Centralized and Federated Learning,” IEEE Access, vol.
10, pp. 40281–40306, 2022, doi:
10.1109/AC CESS.2022.3165809
[4] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K.
Chen, and S. Shieh, “IoT Security: Ongoing Challenges
and Research Opportunities,” in 2014 IEEE 7th
International Conference on Service-Oriented
Comput ing and Applications, 2014, pp. 230–234, doi:
10.1109/SOCA.2014.58.
[5] G. Cascavilla, R. Zwart, D. A. Tamburri, and A. Cuzzocrea,
“Explaining IoT Attacks: An Effective and EfficientSemi-
Supervised Learning Framework,” in 2022 IEEE
International Conference on Big Data (Big Data), 2022,
pp. 5662–5671, doi:
10.1109/BigData55660.2022.10020894.
[6] M. Roopak, G. Yun Tian, and J. Chambers,“DeepLearning
Models for Cyber Security in IoT Networks,” in 2019
IEEE 9th Annual Computing and Communication
Workshop and Conference (CCWC), 2019, pp. 452–457,
doi: 10.1109/CCWC.2019.8666588.
[7] T. Islam, R. A. Youki, B. R. Chowdhury, and A. S. M. T.
Hasan, “An ECC Based Secure Communication Protocol
for Resource Constraints IoT DevicesinSmartHome,”in
Proceedings of the International ConferenceonBigData,
IoT, and Machine Learning, 2022, pp. 431–444.
[8] H. Kim, A. Wasicek, B. Mehne, and E. A. Lee, “A Secure
Network Architecture for the Internet of Things Based
on Local Authorization Entities,” in 2016 IEEE 4th
International Conference on Future Internet of Things
and Cloud (FiCloud), 2016, pp. 114–122, doi:
10.1109/FiCloud.2016.24.
[9] F. K. Santoso and N. C. H. Vun, “Securing IoT for smart
home system,” in 2015 International Symposium on
Consumer Electronics (ISCE), 2015, pp. 1–2, doi:
10.1109/ISCE.2015.7177843
[10] M. Malik, M. Dutta, and J. Granjal, “A Survey of Key
Bootstrapping Protocols Based on Public Key
Cryptography in the Internet of Things,” IEEE Access,
vol. 7, pp. 27443–27464, 2019, doi:
10.1109/ACCESS.2019.2900957.
[11] R. Zahid, M. W. Anwar, F. Azam, A. Amjad, and D.
Mukhtar, “Enhancing End-to-End Communication
Security in IoT Devices Through Application Layer
Protocol,” in Information and Software Technologies,
2022, pp. 148–159.
[12] P. Mall, M. Z. A. Bhuiyan, and R. Amin, “A Lightweight
Secure Communication Protocol for IoT Devices Using
Physically Unclonable Function,” in Security, Privacy,
and Anonymity in Computation, Communication, and
Storage, 2019, pp. 26–35.
[13] R. Sharma and R. Arya, “Secure transmission technique
for data in IoT edge computing infrastructure,”Complex
- 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 310
Intell. Syst., vol. 8, no. 5, pp. 3817–3832, 2022, doi:
10.1007/s40747-021-00576-7.
[14] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on
secure communication protocols for the Internet of
Things,” Ad Hoc Networks, vol. 32, pp. 17–31, 2015, doi:
https://doi.org/10.1016/j.adhoc.2015.01.006.
[15] R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A.
Serbanati, and M. Rossi, “Secure communication for
smart IoT objects: Protocol stacks, use cases and
practical examples,” in 2012 IEEE International
Symposium on a World of Wireless, Mobile and
Multimedia Networks (WoWMoM), 2012, pp. 1–7, doi:
10.1109/WoWMoM.2012.6263790.
[16] K. K. Rout, S. Mallick, and S. Mishra, “Design and
Implementation of an Internet of Things based
Prototype for Smart Home AutomationSystem,”in2018
International Conference on Recent Innovations in
Electrical, Electronics Communication Engineering
(ICRIEECE), 2018, pp. 67–72, doi:
10.1109/ICRIEECE44171.2018.9008410.
[17] Chifor, I. Bica, V.-V. Patriciu, and F. Pop, “A security
authorization scheme for smarthomeInternetofThings
devices,” Futur. Gener. Comput. Syst., vol. 86, pp. 740–
749, 2018, doi:
https://doi.org/10.1016/j.future.2017.05.048.
[18] R. Roman, R. Arjona, and I. Baturone, “Post-quantum
Secure Com- ´ munication with IoT Devices Using Kyber
and SRAM Behavioral and Physical Unclonable
Functions (Extended Abstract),”inAttacksandDefenses
for the Internet-of-Things, 2022, pp. 72–83.
[19] R. V. S. Boolakee, S. Armoogum, R. Foogooa, and G.
Suddul, “Ensuring Secure Communication from an IoT
Edge Device to a Server Through IoT Communication
Protocols,” in Progress in Advanced Computing and
Intelligent Engineering, 2021, pp. 337–349.
[20] S. Encheva and S. Tumin, “Simple E2EE Secure
Communication Protocol for Tiny IoT Devices,” in
Cooperative Design, Visualization, and Engineering,
2022, pp. 286–292.
[21] S. Encheva and S. Tumin, “Simple E2EE Secure
Communication Protocol for Tiny IoT Devices,” in
Cooperative Design, Visualization, and Engineering,
2022, pp. 286–292.
[22] C. Mateo, F. Almagro, W.-J. Yi, and J. Saniie, “Design Flow
and Implementation of an IoT Smart Power Socket,” in
2021 IEEE Inter national Conference on Electro
Information Technology (EIT), 2021, pp. 151–156, doi:
10.1109/EIT51626.2021.9491841.
[23] A. Rehman, A. R. Syed, I. U. Khan, A. A. Mustafa, M. B.
Anwer, and U. A. Ali, “IoT-Enabled Smart Socket,” Wirel.
Pers. Commun., vol. 116, no. 2, pp. 1151–1169, 2021,
doi: 10.1007/s11277-020-07043-5.