Security in IP-Based IoT Node and Device Authentication

2023-10-27

Abstract:

The IoT security aims for enabling IoT data protection in various interconnected nodes. These frameworks require secured solutions to prohibit evaporation of personal information and harmful activate ventures by means of peer authentication and secure data transmission between the IoT nodes and devices. Node communication in IoT network sometime get hack and wrong operation performs if it happened then there will be a chance to go for heavy loss. So that proposed methodology improves the communication network with the implementation of IP binding technique and the uses of random encryption selection process. As there are the different nodes like receiver and sender data will be send to receiver in which the receive data need to be valid and decrypted using shared keys into the packet. At the receiver end before transferring the data to the IoT node it will be perform with IP extraction packet with IP validation on to the received packet which leads to perform secure data sharing at the both receiver and sender node. As per the above description the proposed mechanism will help for maintaining the security in IoT network.

SECTION I.

Introduction

The IP based IoT devices enables various smart electronics devices. These electronic devices are equipped with sensing, acting, and wireless communication capabilities. These capabilities are beneficial to interact and cooperate with each other in a universal way by means of IP connectivity. A Smart device is used to connect with IP based IoT node and devices as well as can be easily operate [1].

Each one electronics devices getting to be controlled and can we operate through the radiotelephone at 2050. So, for every second data will be stored and retrieved.IoT architecture mostly consist of sensors which are connected to IoT board so, this particular IoT board is called as Node. The numbers of Node will be connected into single network which will be called as IoT Networks. Whole data will be passed through this IoT Networks so, may their will be a chance to the inturder to hack this networks which may cause a big loss.So, by implimenting Internet of things Secure Protocol System it is possible to avoid this loss [2][3].

To improve this sender-receiver verification technique is get propose. Here the data is get transfer to the user with highly encryption and key transfer technique so that the data in network is remain secured in this the system will also check for the sender side and receiver side.

If the side is right the cross verification is done otherwise not [4][5]. secure communication channel is established by IoT nodes and devices; while their connection should be bootstrapped through the process of node and device binding. In client server network of applications, client can be to verify and identity server with third party, binding does not collusion to bootstrap the communication between the client applications and the earmarked process of binding of IP based IoT node and device as shown in figure 1.

Fig. 1.

Establish the connection between node and device

Show All

In figure 1, each device has its device password, in order that single authenticated user perceivable the password and connect with the device this procedure is called as IP based manual identification. Meanwhile the user connects with the device; the client will select their Wi-Fi connection for the device to connect. Finally the device and application will find each other on the Wi-Fi network [6]. Firstly the users need to connect with the specific device according to its IP address, the authorisation of Wi-Fi will be delivered to that device only. For better understanding the problem we can get the first step to represent proper study on IoT node and device binding mechanisms along with the secure connections [7][8]. In second step it is manually check the IoT node and device authentication process and found that third party attacks can be genuine implemented in IP based IoT devices[9][10]. This research discloses the major failure that the doubt of the restricted environment, which frequently causes the absence of authentication throughout the process of node and device binding. Ultimately, this permit close intruders, such as neighbours, secret dispatch; third party attacks and to completely handle the sacrifice's device [11].

SECTION II.

Methodology

Main aim to authenticate IoT Nodes and Devices based on unique IP address. Mostly IoT devices exchange their traffic regularly with servers. If we know these servers; we are able to identify IoT devices by observing traffic at during packet exchanges procedure also identify the types of nodes and their devices. Major goal is to find out virtual node creator in network as well as virtual device creator in network based on unique IP address.

Extract the IP of IoT device in a given node bind with the signal and send to receiver. Perform encryption on the signal data or node data of the IP. At the receiver end data is going to be received and decrypted. Then splitting of IP address and signal will be workout.

Check the retrieved IP address by trust list bind with receiver. If it's found then data will be in else it's going to be crosscheck with the other receiver trust list. On the basis of that IP bound factor will be calculated. Depend on that the authenticity of the IP will be measure and decision will be taken for acceptance or rejection.

A. IP Binding Model

In this technique the binding of IP address getting to be drill. Here the IP of sender and receiver is get bind with packet of message and send over the network. To which the IP address also get encrypted if any message is get altered then bind IP of the sender is also get updated. Now the receiver side will able to identify the exact sender IP address in which the sender can be easily identify by pattern matching implementation over the IP of sender and receiver. If the message get altered then receiver comes to know that the data signal get alter by intruder and will not perform the operation send the notification to admin IP binding sender IP and Receiver IP cross verification plays role of maintain security over the data signal transmission so that false message will not get delivered to the IoT boards which only restrict to the right sender and receiver terminal.

Fig. 2.

Advance architecture of secure protocol system for IoT

Show All

Advance Architecture of proposed secure protocol system is represented in figure 2. In which there is receiver node and sender node which are connected in IoT network. In which sender node will receive the data from IoT board and perform IP binding, then encryption over the received data and form a signal packet of that which is latterly shared to the cloud via IoT network. At the other end signal is going to be received which latterly proceed with IP verification and decryption, which delivered the actual data to the receiver node according to the decision are taken by the receiver.

SECTION III.

Design for Secure Communication

As per the existing study in IoT Networks most probably data will be shared without any authentication and verification which cause big security clause in IoT Networks.

So, it is necessary to improve data sharing with some advance techniques. So, that we propose a mechanism which authenticate and verify data at the time of sending as well as receiving which make the IoT network more secure. Through figure 2 this window performs Device as well as Node login as shown in figure 3. Every Node is configured with Username and Password. The Particular Node is going to be allotted with Username and Password. That Data will be considered for Authentication of credentials. A login form is used to enter authentication credentials to access a restricted form. The login form contains a field for the username and password. When the login form was submitted its underlying code checks that the credentials are authentic or not [12].

Fig. 3.

Node and device login panel

Show All

A. Virtual Node Creator in Network

In figure 4 first to create a node and add number of devices for every device we are going to manipulate data as per the algorithm given there are various range of algorithm for encrypting the data. So, every node we receive and send the data using different encryption algorithms, for authentication, integration, confidentiality and encryption from different devices used on IoT [13][14].

Fig. 4.

Virtual node creator in network

Show All

B. Virtual Device Creator in Network

In figure 5 first register the required IoT devices with IP Address along with username, password and IoT node name. Understand the risk of unsecure IoT nodes and devices requires location information with respect to; latitudinal and longitudinal way then registered IP-based IoT devices [15].

Fig. 5.

Virtual device creator in network

Show All

SECTION IV.

Security Analysis

The Dashboard in figure 6 represents the list of Nodes and it's connected Devices. This Dashboard also helps to control all Nodes transmission and their data. Secure communication is required since the adversary can eavesdrop on traffic in the IoT network and maliciously modify it. Two communicating parties must establish a pair-wise key to assure authentication [16].

Fig. 6.

Admin dashboard with node and device details

Show All

SECTION V.

Secure Communication System's Flow Chart

The goal of the propose model is to build a secure protocol system for the IoT network to decrease time, memory consumption. Also provide suitable security mechanisms for the IoT security layers. The proposed model helps researchers and designers to select the convenient protocols and security mechanisms for each security layer to secure data and smart objects. In the proposed model, we use Things Board platform which provides many security mechanisms. Also, manage the strategy of selection security algorithms to achieve high level of security requirements and decrease power consumption and time [17][18].

The graphical representation of proposed secure protocol system is represented in figure 7.

The procedure of the proposed model work flow chart can be presented in Figure 7 as follows:

  • Collecting to nodes and bind with the signal and send to NodeMCU ESP8266 module.

  • Message or signal to send.

  • Add sender IP to transmitted data.

  • Perform encryption on data and sender IP.

  • Received data over the node.

  • Decryption of receiver IP and signal.

  • Verify IP of receiver.

  • If IP match with IP list then and only then allow data receiving.

  • Else it's going to be cross check with the other receiver trust list.

  • Data will be found then stop the process.

Fig. 7.

Proposed secure system flow chart

Show All

The following flowchart shows the step by step approach to solving a task:

  • Step 1:

    Exact the IP of IoT device in a given node bind with the signal and send to receiver.

  • Step 2:

    Perform Encryption on the signal data or node data of the IP.

  • Step 3:

    The receiver side data is going to be received and decrypted. Then splitting of IP address and signal will be workout.

  • Step 4:

    Checking of the retrieved IP address with trust list bind with receiver.

  • Step 5:

    If it's found then data will be in else it's going to be crosscheck with the other receiver trust list.

  • Step 6:

    On the basis of that IP bound factor will be calculated.

  • Step 7:

    Depend on that the authenticity of the IP will be measure and decision will be taken for acceptance or rejection.

SECTION VI.

Proposed Secure Communication System's Algorithm

Our proposed algorithm is Secure Protocol System for IoT

(SPSIOT) workout in the following steps:

STEPS:

  1. Start()

  2. Bindedip=null;

  3. IP=GetIP(Extract−ip−sender);

  4. splited_digits_ip=Split_Ip_Data(IP);

  5. for single_digits insplited_digits_ip;

  6. char−digit−ConvertToChar(single−digit);

  7. ASCII_digit=GetAsciiValue(char_digit);

  8. rand=GetRand();

  9. fina1−digit=ASCII−digit+Rand;

  10. fina1−digit=fina1−digit+Tai1−Factor();

  11. form−ecoded−ip=ApplyEncoding(final−digit);

  12. Output(form_ecoded_ip);

  13. Finish;

Explanation:

  • Step 1:

    First of all we start the function. Start ()

  • Step 2:

    Determine the variable Bindeip is equal to null that is Bindeip=null;

  • Step 3:

    Extract the IP by using the function GetIP () with Extract_ip_sender parameter. GetIP (Extract_ip_sender);

  • Step 4:

    After getting IP split the IP by using split_Ip_Data() with parameter IP and transfer the value to spilted_digits_ip variable. splited_digits_ip = split_lp_Data(IP);

  • Step 5:

    After that we get single_digit from splited_digits_ip. single_digits = splited-digits-ip;

  • Step 6:

    Convert the single digit to character digit by using ConvertToChar () with parameter single_digit. char_digit = ConvertToChar (single_digit);

  • Step 7:

    Then convert the single digits to ASCII value. ASCII−digit=ConvertToASCII(char−digit);

  • Step 8:

    Apply randomization function with the help of GetRand (). rand=GetRand();

  • Step 9:

    Adding ASCII_digit with randomization function we get final digit. final−digit=ASCII−digit+Rand;

  • Step 10:

    Final out final digit after adding final digit with tail factor function final−digit= final_digit + Tail_Factor();

  • Step 11:

    Form encoded IP by applying encoding to final digit. form−ecoded−ip= ApplyEncoding (final-digit);

  • Step 12:

    Form encoded IP as an output that is IP->Char-> INT -> ASCII ->rand-> form_ecoded_ip

  • Step 13:

    Final IP is going to be transfer as a sender side this same IP is also to be decrypted at the other end that is receiver side.

  • Step 14:

    Over that perform decryption again split that into reverse order, get the number Perform your encoded IP.

SECTION VII.

Result and Analysis

As per the propose system the practical evaluation shown into the figure 8. In which the first window will shown implementation and result of various nodes are connected to the IoT network. To which the parameters like trust factor, encrypted IP, encrypted receiver message is shown.

Fig. 8.

Received network data

Show All

In Figure 9 terminal output of NodeMCU shows the device data collected and send to the server or IoT network. As there are the different parameters shown the main parameter like encrypted message, encrypted IP used for result evaluation. It is seen to be that the proposed network protocol helps to increase the security of IoT network.

Fig. 9.

Active object detection

Show All

SECTION VIII.

Conclusion and Future Work

As per the existing study in IoT Networks most probably data will be shared without any authentication and verification which cause big security clause in IoT Networks. So, it is necessary to improve data sharing with some advance techniques. So that the propose mechanism which authenticate and verify data at the time of sending as well as receiving which make the IoT network more secure. If there is any attacks perform in IoT network then due to the authentication the intruder can be trap and system will not allowed to change the network data. The goal of this module helps researchers and designers to select the convenient protocols and security mechanisms for each security layer to secure data and smart objects. The secure protocol system is use to prevent or decrease attacks, threats and various types of problems that occur during the device authentication process.

本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有涉嫌抄袭侵权的内容,请联系:hwhale#tublm.com(使用前将#替换为@)

Security in IP-Based IoT Node and Device Authentication 的相关文章

随机推荐

  • 工业物联网与其他物联网应用有哪些不同?

    物联网在众多的细分领域里早已让相关的企业实现了颠覆性的转型 这些领域涵盖了消费物联网 智慧农业领域 医疗保健 制造业领域和公用事业领域等等 工业物联网作为物联网一个不容忽视的子集 它专注于解决工业应用中的特殊要求 如制造业 石油和天然气及公
  • [MySql]基本知识及表的创建

    目录 1 数据库的操作 2 常用的数据类型 2 1数值类型 2 2字符串类型 2 3日期类型 3 表的操作 4 使用示例 1 数据库的操作 show databases 显示当前数据库 create database database na
  • linux服务器安装mysql步骤详解

    还是按照菜鸟教程上的顺序进行安装 踩的坑还是比较少的 MySQL 安装 菜鸟教程 1 安装前 我们可以检测系统是否自带安装 MySQL rpm qa grep mysql 2 如果你系统有安装 那可以选择进行卸载 rpm e mysql 普
  • ModBus协议部分功能码设计与实现方法(QT环境)

    写在前面 资源 QT环境下实现资源 1 调研 1 1 什么是Modbus Modbus由MODICON公司于1979年开发 是一种工业现场总线协议标准 1996年施耐德公司推出基于以太网TCP IP的Modbus协议 ModbusTCP M
  • (9)目标检测_SSD的原理

    0主要参考原理来源 1 SSD 论文 代码 pytorch zonechen 博客园 2 python ssd目标检测 目标检测之SSD算法实现 Pytorch weixin 39805734的博客 CSDN博客 3 2 1SSD算法理论
  • Python教程:Python3.8了解差不多了,Python3.9新特性了解一下

    本期Python教程将解释 Python 3 9 中的新特性 而不是 3 8 官网目前也只有 3 8 的下载包 3 9 需要自己编译 Cpython 语言上的变化 1 使用 Python 进行相对导包的时候 import 出现异常时类型由原
  • 启动失败 Failed to determine a suitable driver class 问题解决方案

    1 问题描述 启动报错 Description Failed to configure a DataSource url attribute is not specified and no embedded datasource could
  • GFS故障解决

    一 问题描述 之前 两台数据库服务器安装了两个实例 共享磁盘阵列 通过ASM管理 日志文件和控制文件等 通过GFS实现共享存储文件同步 系统工作正常 某天加入第三个节点时失败 集群正常使用就没再管它 某日 数据库异常 重启操作系统后 GFS
  • Spring Boot整合Mybatis-Plus快速入门(二)

    之前快速搭建项目中 创建的类名与表名以及属性名都是一致的 所以mybatis plus可以根据类名以及属性名进行对应的操作 那么如果表名与属性名中不一致或属性名与列名不一致时我们应该怎么处理呢 这里mybatis plus为我们提供了很多注
  • 解决VMware14打开虚拟机黑屏问题

    最近把VMware升级到14 0之后 运行虚拟机之后无法显示图像 屏幕一团黑 但点击显示缩略图的时候是可以看到系统已经启动并在正常运行的 可以通过以下方法解决 以管理员身份打开命令提示符 输入命令 netsh winsock reset 重
  • 知识图谱(七)——事件抽取

    文章目录 一 任务概述 1 事件的定义 2 事件抽取的定义 3 相关评测和语料资源 二 限定域事件抽取 1 基于模式匹配的事件抽取方法 1 有监督的事件模式匹配 2 弱监督的事件模式匹配 3 优缺点 2 基于机器学习的事件抽取方法 1 有监
  • arm-none-eabi-gcc编译、链接选项详解

    1 mthumb 和 mthumb interwork mthumb 的意义是 使用这个编译选项生成的目标文件是Thumb指令的 目前还没有发现GNU编译器中有哪一个选项可以指定生成的目标文件是thumb 2的 相对应的 marm 的意义是
  • 多态,虚函数,纯虚函数

    多态 借助虚函数 基类指针既可以使用基类 父类 的成员函数 也可以使用派生类 子类 的成员函数 它有多种形态 或多种表现方式 这就是多态 简单说就是同一条语句可以执行不同的操作 看起来有不同表现方式 这就是多态 构成多态的条件 多态存在的三
  • .net 平台下的数学库math.net(一)

    Math NET的目标是为提供一款自身包含清晰框架的符号运算和数学运算 科学运算 它是C 开发的开源类库 Math NET含了一个支持线性代数的解析器 分析复杂微分 解方程等等功能 这个项目大部分采用的是MIT X11开源软件协议 目前该组
  • ConstraintLayout实用特性

    转载自赵彦军的博客 前言 在2016年的Google I O大会上 Google 发布了Android Studio 2 2预览版 同时也发布了Android 新的布局方案 ConstraintLayout 但是最近的一年也没有大规模的使用
  • 【ABviewer从零开始教学查看器篇②】关于打开文件的快捷方式

    ABViewer是一款高质量 高效率 低成本的多功能设计及工程文档管理工具 能为您提供全面的专业的浏览及编辑功能 同时支持30多种光栅和矢量图形格式 在小编看来 ABViewer是一款非常简单且实用的CAD文档查看与编辑器 对于使用小白可能
  • 判断是否是数组

    整理了一些 留待自己复习用 1 instanceof var a name fangxiaoming age 19 var b 1 2 3 4 console log a instanceof Array false console log
  • 【翻译】我们建立了一个.NET操作员SDK(所以您不必这样做)。

    我们用C 语言构建了一个 NET操作者SDK 因此您可以用C 或任何 NET语言构建自己的Kubernetes操作者 当然也 有Go Operator SDK 还有我们的Java Operator SDK 那么为什么不为 NET社区提供一些
  • 用 Visual Studio 2019 编译 FFmpeg 简单教程

    需要的东西 Visual Studio 2019 这个自行解决吧 本人用的是社区版 MSYS 环境 去 https www msys2 org 下载 本人下载的是 msys2 x86 64 20210725 exe yasm exe 去 h
  • Security in IP-Based IoT Node and Device Authentication

    Abstract The IoT security aims for enabling IoT data protection in various interconnected nodes These frameworks require