0% found this document useful (0 votes)
110 views6 pages

IoT Crypto: Secure Communication Framework

The document presents IoT-Crypto, a secure communication framework designed for the Internet of Things (IoT), addressing the increasing need for security in IoT applications. It outlines the architecture, communication models, and cryptographic methods employed to ensure secure interactions among IoT devices, including device-to-device, device-to-cloud, and device-to-gateway communications. The paper also discusses the implementation details, testing methodologies, and the performance of the IoT-Crypto system, highlighting its effectiveness in providing secure and efficient communication in IoT networks.

Uploaded by

titikshabhavsar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views6 pages

IoT Crypto: Secure Communication Framework

The document presents IoT-Crypto, a secure communication framework designed for the Internet of Things (IoT), addressing the increasing need for security in IoT applications. It outlines the architecture, communication models, and cryptographic methods employed to ensure secure interactions among IoT devices, including device-to-device, device-to-cloud, and device-to-gateway communications. The paper also discusses the implementation details, testing methodologies, and the performance of the IoT-Crypto system, highlighting its effectiveness in providing secure and efficient communication in IoT networks.

Uploaded by

titikshabhavsar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

2024 International Conference on Advancement in Computation & Computer Technologies (InCACCT)

IOT CRYPTOGRAPHY: A SECURE COMMUNICATION FRAMEWORK FOR THE


INTERNET OF THINGS

Midhvana Rishi Vaibhav Dubey Mukesh Kumar Bhardwaj


Department of Computer Science Department of Computer Science Department of Computer Science
Engineering, Dronacharya Group of Engineering, Dronacharya Group of Engineering, Dronacharya Group of
Institutions Institutions Institutions
Greater Noida Gautam Budhh Nagar, Greater Noida Gautam Budhh Nagar, Greater Noida Gautam Budhh Nagar,
India India India
midhvana.16307@[Link].i dubeyvaibhav482@[Link] mukeshbhardwaj85@[Link]
nfo
Mahesh Kumar Singh
Department of Computer Science
Engineering, Dronacharya Group of
Institutions
Greater Noida Gautam Budhh Nagar,
2024 International Conference on Intelligent Systems for Cybersecurity (ISCS) | 979-8-3503-7523-7/24/$31.00 ©2024 IEEE | DOI: 10.1109/ISCS61804.2024.10581329

India
maheshkrsg@[Link]

Abstract— IoT is a lightning-fast technology that uses clever I. INTRODUCTION


objects or stuff that speak uncomplicatedly to the work of our Consistently, an outstanding development in the number of
daily lives. Smart homes, wearables, connected automobiles, associated gadgets is seen. These outcomes in the Internet of
vibrant urban communities; savvy retail, agribusiness, Things (IoT) another internet communication standard the
healthcare, and other areas are some of the most well-known customary IoT idea integrates shrewd articles with sensors and
applications of IoT. This document provides an overview of IoT Radio Recurrence Recognizable proof (RFID) labels [1], for
Crypto a safe platform Internet of Things communication. example, fridges, streetlamps, clothes washers, climate control
Typically, they have elements from Internet of Things (IoT), such systems, vehicles, and others. The IoT and shrewd contraptions are
as the device functionality they need, the requirement to restrict conveyed through state-of-the-art communication strategies
the amount of information sent, and the ability to connect to the including distributed computing, Wi-Fi, and WiMAX.
Internet. With real business relationships in mind, Innovative IoT is the incorporation of a wide scope of brilliant gadgets that
lightweight authentication setup and trust concepts are provided influence day-to-day exercises, for example, e-learning, well-
by IoT-Crypto. Include a secure communication protocol that being, and remote checking and observation. IoT likewise has a
only makes use of one DTLS connection that is encrypted. This huge impact in various regions, including mechanization and wise
article discusses and presents the unique components and modern creation, shrewd strategies, and savvy transportation [2].
nuanced execution details of IoT crypto in terms of essentially The government, businesses, and the public are key IoT
equivalent arrangements. Post-implementation testing and stakeholders. IoT now needs promotional policies to create new
analysis of the IoT encrypted network have proven its accuracy network models. 'Value Up' data and 'Cost Down' models are the
and safety. Additionally, a test network was conducted to goals of IoT.
determine if the BLE IPSP profile and coding standards are
suitable for IoT. Based on these results, the significance of future A. Communication Models in IoT
research was discussed. The IoT paradigm and communication The IoT communication methods are included in an
protocols are introduced at the outset of this work and then architectural paper that the Internet Architecture Board (IAB)
compare countermeasures for a few security vulnerabilities at produced [16]. The section below presents the main features of the
each tier of the IoT model to protect such a large and diverse communication models in depth.
company.
a. Device-to-Device Communications
This architecture fig-1 does not use an intermediary application
Keywords— Internet of Things, IoT Model, Communication
Technology, Security, Attacks server for communication between two or more smart devices;
instead, communication occurs directly between the devices.

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
Bluetooth, Z Wave, or Zigbee are the communication mediums discusses the IoT device restrictions, while the second one
used in this style of communication [3]. categorizes assaults. The third section provides insight into
authentication designs, and the fourth discusses the problems with
the security of different tiers. IoT applications provide a lot of
benefits to people. The prices are also quite high. Customers are
willing to spend a lot, yet security is lacking. IoT manufacturers
pay less attention to the security system that customers are given.
Figure 1: Model for Device-to-Device Communication Implementing hash and cryptographic methods at the physical
layer and network layer authentication mechanisms are two

b. Device-to-Cloud Communication examples of preventative measures [5]. Only authorized users are

By associating straightforwardly with the cloud, IoT smart allowed to complete the transaction, which may be secured by the

devices share information and direct traffic streams in this application layer using authentication, encryption, and integrity

communication worldview. Fig. 2 illustrates the thought hidden in verification.

the gadget-to-cloud communication approach.


III. PROPOSED METHODOLOGY
A. Basic Architecture of the Proposed Model
An example of an IoT system is IoT-Crypto. It has a variety of
uniquely designed features and systems. They are designed to
address many of the IoT network operational issues that have
already been identified (see fig. 4).

Figure 2: Model for Device-to-Cloud Communication


c. Model for Device to Gateway
The Gadget to-Application-Layer Entryway idea is another name
for the Gadget to-Passage idea. As per this idea, a nearby passage
serves as a go-between for smart devices and is pre-stacked with
the application software.
In this plan, the nearby passage gadget serves as a scaffold
between the smart gadget and cloud service by running application
software. Security and information/protocol translation are features
Figure 4: IoT Crypto-Network Architecture
offered by the nearby passage gadget. This idea is used in smart
homes, cities, and other applications. Figure 3 provides further IoT subnets conduct IoT tasks. IoT devices may execute
information on the gadget-to-entryway model. operations, gather data (typically sensor readings), and provide
alarms. Both final functions are similar. Data collection might be
synchronous, but alert generation is always asynchronous.
A gateway connects IoT devices in a subnet to cloud servers.
Network gates are vital [6]. They are communication proxies. This
position translates protocols and supports communication utilizing
different standards. Gateway devices handle most encryption and
cryptographic trust checks. It implies that IoT devices execute
business-critical functions and a minimum technological workload
Figure 3: Device-to-Gateway Model involving networks and crypto.
II. LITERATURE REVIEW The cloud layer manages the organization and collects, processes,
Numerous studies have been conducted to lessen the risks and stores information. It includes server applications. Outer users
associated with the capabilities of the Physical IoT [4]. There are and systems just see the cloud layer — The programming interface
four parts, according to the poll that was done. The first one and GUI offered by those apps.

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
One business maintains the IoT-Crypto organization. It might work The C programming language was majorly used to develop IoT-
with network managers. IoT-Crypto lets such firms work together. Crypto. Many justifications have been made for this choice. One
They might share the organization [7]. Network layers might can make use of the C code to write and run or simply execute on
collaborate. Gateways might interface with business accomplice any hardware system being used comprising potent servers, limited
cloud servers and IoT devices. Cloud servers might share ARM and x86 devices, and microcontrollers [10]. The use of
information, sensor readings, and organization structure under language-specific libraries and maintaining portions of code
business agreements. Adjusting or dropping the Participation connected with cryptographic methods written in many
Scope is easy. All these systems are wholly dependent on programming languages would be a significant drawback. The
cryptographic identities and operations, or the cryptographic software's basis is the MBED TLS open-source C library as shown
association of business transactions. in figure-5. It is effectively kept up with and moved along. Its
IoT subnets conduct IoT tasks. IoT devices may execute absence of significant outer reliance is its key separating factor. If
operations, gather data (typically sensor readings), and provide they are not offered on a specific platform, supplanting them is
alarms. Both final functions are similar. Data collection might be possible and simple. Software fabricated using the MBED TLS
synchronous, but alert generation is always asynchronous. library will thus chip away at any platform, satisfying the
A gateway connects IoT devices in a subnet to cloud servers. presentation's standards.
Network gates are vital. They are communication proxies. This
position translates protocols and supports communication utilizing
different standards. Gateway devices handle most encryption and
cryptographic trust checks. It implies IoT devices execute
business-critical functions and a minimum volume of high-tech
network and cryptographic—workload.
The cloud layer manages the organization and collects, processes,
and stores information. It includes server applications. Outer users
and systems just see the cloud layer — The programming interface
and GUI offered by those apps.

B. Distinctive Security Features


The IoT-Crypto system uses security by design, unlike other IoT Figure 5: IoT-Crypto authentication using C structures.
systems [8]. It cannot be deployed without encryption and security The following are the steps for the declaration check:
since they are integrated into the network. Devices have distinct • Verification of the expiration date.
cryptographic identities. Identity design sets it apart. It has a • Validity verification of self-signatures.
framework for building trust relationships and an IoT-specific
• Looking for a trusted party's signature that was attached
cryptographic certificate. Contrary to similar options, to the certificate.
cryptographic identities are used for encryption, authentication,
and authorization. Many solely utilize identity for authentication B. IoT- Crypto Device Software
The IoT-Crypto network's devices' cryptographic identities are
Devices sit tight for door initialization messages after turning on.
based on bespoke cryptographic certificate formats. Certificate
This message includes passage ID and organization address [12].
design affects various network operations and device connectivity.
IoT gadgets might be associated with doors and arrange keys (see
An IoT-specific format gave tremendous flexibility to customize
Fig 6). After key exchange, the gadget enters occasion handling
and optimize network operations. IoT networks may employ
mode and handles synchronous (request/response) entryway sensor
popular formats like X.509. However, they are unsuitable.
understanding requests and instructions. Asynchronous
However, the IoT-Crypto certificate format borrowed from those
(spontaneous) signals from the IoT gadget to the door might
formats.
incorporate sensor understanding warnings. These two threads are
IV. IMPLEMENTATION DETAILS
running simultaneously. Gadget Software is composed using the
IoT-Crypto library [13].
A. Cryptographic Details and Certificate Format

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
Figure 6: Operation of IoT device software in the IoT-Crypto system

C. IoT-Crypto Cloud Server Software Fig 8: Operation of IoT gateway software in the IoT-Crypto system
IoT devices reside across a network of IoT encryption cloud V. EXPERIMENTS AND TESTS
servers (see Fig. 7). A. Test Network Structure
In his program, he does two things. IoT encryption solutions were evaluated using simulated scenarios
• A regular business operation provides an HTTP programming from certified IoT organizations. One Raspberry Pi 4B device acts
interface and is responsible for recycling requests entered as an IoT input, two Jeer Pi 4B bias act as IoT devices, a Wi-Fi
from consumer and surface networks to enable interaction switch for internet spell, and an IoT encrypted cloud server acts as
accompanied by the IoT cryptographic organization. a virtual cloud machine function. Form a test network. Design
• Cryptographic applications verify certificates and signatures tested as needed.
while securely communicating with other devices in your The IoT network architecture described is the same as the test
organization. network [15]. It enables performance evaluations and testing of all
the IoT-Crypto solution's functionalities. The network may also be
changed, and other wireless communication protocols can be
tested.
B. Protocol Costs Associated with Cryptographic
Methods
IoT network security requires processing and transmission
overhead. First and foremost is a handshake for a secure
communication channel. 1639 bytes sent over the IoT encrypted
network. This amount is small given that X.509 certificates can
Figure 7: Structure of the IoT-crypto server software exceed 2000 bytes.

D. IoT-Crypto Gateway Software


The gateway is needed by the IoT-Crypto network. It supports
many IoT devices. Each gateway connects restricted IoT devices to
one cloud server. The gateway creates a network of IoT devices.
The IoT subnet supports many wireless and communication
technologies. The gateway must handle them and translate
protocols as required. IPv4 and IPv6 IPoT-Crypto network
gateways use Wireless-Fidelity, BLE, and Ethernet at the network Figure 9: Packet sizes for the IoT-Crypto transfer protocol.
access layer [14]. Wire shark observed device communication. Modified IoT-Crypto
software determined protocol message and data structure sizes
using several encoding techniques. Support for non-CBOR
encoding was added in Figure 9.
Running IoT-Crypto software with and without cryptographic
methods has no discernible impact on CPU or power usage [17]. C
profiler measurements were more accurate. Their results are shown

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
in Figure 10. Peer certificate verification, they discovered,
accounted for 50% of computational overhead.

Figure 12: 6LowPAN BLE test network average connection


Figure 10: Types of IoT-crypto computation overhead performance observed with iperf3. Each arrangement included 50
measurements. Results were repeated. The graphic shows average.
C. Comparison of Encoding
Internet and Wi-Fi round-trip times are substantially less than the
CBOR encodes IoT-Crypto network data and device data. JSON-
measured ones. Results ranged widely. Figure 13 shows the
like binary format CBOR offers stricter type control than JSON.
average results from 200 configurations. The devices’ default
CoAP recommends CBOR encoding. HTTP utilizes JSON
configurations were tested. The default BLE connection interval is
encoding, while CoAP is lighter. IoT-Crypto communication
30–60 ms. Data packets are only sent during data transfer events at
protocol is not dependent on CoAP or HTTP [18]. Constrained
a defined interval. Measurements match connection settings.
systems selected CBOR encoding. It outperforms JSON along with
Connection intervals may delay one-to-one connections by 120 ms
raw binary format in this application (Figure 11).
and 180 ms for intermediate device connection. Results match the
comprehensive IPv6-based BLE connectivity investigation [20].
That research focused on Contiki OS protocol stack
implementation and did not account for device distance
discrepancies.

Figure 11: Sizes of the encoded IoT-Crypto data structures

D. Suitability of the Wireless Standards


Several wireless methods of communication are used in IoT
networks. This task did not involve any testing or comparisons.
IoT Encrypted Network Standard enables TCP/IP protocol stack
and IP packet transmission. Ethernet and Wi-Fi were used in the
Figure 13: Measured test network by the 6Ping utility low transmission
test network in Section 5.1. Both have undergone performance and
delays for PAN BLE. There were 200 measurements in each configuration.
feature testing and are well-known. The graph displays typical performance.
IPv6 is presently supported by a program called IoT-Crypto. In our
VI. CONCLUSIONS AND FUTURE WORK
test network, a Raspberry Pi acted as his IPv6 router and gateway
for his 6LowPAN BLE device [19]. The IoT encrypted network This post introduced IoT-Crypto, a purpose-erected IoT result that
worked well with this configuration. Further analysis was done on can be worn to make highly practical and assured IoT networks.
connection performance. In our tests, we recorded 239.2 kbps at IoT-Crypto was developed by considering key architectural
1m between devices (Figure 12). Throughput increases when elements, information flow, hardware limitations, security
throughput decreases due to interference, as opposed to proximity. requirements, and the details and hierarchy of IoT systems. The
BLE throughput is impacted by radio interference, transmission proposed treatment was developed from scratch. This approach
interval, and application layer protocol overhead. The findings of allowed for extensive optimizations and circumvented problems
the BLE performance evaluation fall within the predicted range. that can arise from using legacy Internet protocols that were not
designed for IoT applications. IoT Encryption uses a lightweight

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
version of X.509 authorization and a proprietary application layer 9. Mohammed, Husamuddin & Qayyum, Mohammed.
(2017). Internet of Things :A Study on Security and
protocol instead of a generic Hypertext transfer protocol and
Privacy Threats. s10.1109/Anti-
Constrained Application Protocol. Additionally, it makes use of Cybercrime.2017.7905270.
10. Hassija, Vikas & Chamola, Vinay & Saxena, Vikas &
well-established also tested protocols like CBOR, a highly
Jain, Divyansh & Goyal, Pranav & Sikdar, Biplab.
effective standard for data serialization, and DTLS, the cornerstone (2019). A Survey on IoT Security: Application Areas,
Security Threats, and Solution Architectures. IEEE
of encryption and connection security. Encrypted trusted
Access. PP. 1-1. 10.1109/ACCESS.2019.2924045.
connections based on observable business interactions between 11. Ud Din, Ikram & Guizani, Mohsen & Kim, Byung-Seo
& Hassan, Suhaidi & Khan, Khurram. (2018). Trust
companies operating IoT networks are the most novel and exciting
Management Techniques for the Internet of Things: A
part of IoT encryption solutions. It has incredible furnishing Survey. IEEE Access. PP. 1-1.
10.1109/ACCESS.2018.2880838.
possibilities and versatility. This trust model is made possible by a
12. Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam
new authorization format that loosely replaces X.509 and A. Khan, Muhammad Waseem Akhtar, Asad Waqar
Malik, Arslan Munir, Jawad Ahmad, and Balawal
OpenPGP. His second great feature of IoT encryption is its close
Shabir. 2022. "Evolution towards Smart and Software-
relationship with automatic configuration tools and encryption. Defined Internet of Things" AI 3, no. 1: 100-123.
[Link]
Many parts of the network make direct use of encryption, such as
13. G. Kumar, Pragya, L. P. Verma, S. S. Rawat and M. K.
identifying and removing devices and determining network Singh, "An Experimental Study of Concurrent Multipath
topology. The focus of IoT encryption is mainly to provide Transmission Protocol in Lossy and Asymmetric Network
Environment," 2023 International Conference on
[Link] was erected on cryptographic technology well than Sustainable Emerging Innovations in Engineering and
trying to secure communication channels. Technology (ICSEIET), Ghaziabad, India, 2023, pp. 745-
750, doi: 10.1109/ICSEIET58677.2023.10303388
REFERENCES
14. Resul Das, Muhammad Muhammad Inuwa, A review on
1. Banerjee, U.; Juvekar, C.; Fuller, S.H.; Chandrakasan, fog computing: Issues, characteristics, challenges, and
A.P. EeDTLS: Energy-efficient datagram transport layer potential applications, Telematics and Informatics
security for the internet of things. In Proceedings of the Reports,Volume 10,2023,100049,ISSN 2772-5030,
2017 IEEE Global Communications Conference, [Link]
GLOBECOM 2017, Singapore, 4–8 December 2017; pp. 15. .Raeisi-Varzaneh, Mostafa & Dakkak, Omar & Alaidaros,
1–6. Hashem & Avci, İsa. (2024). Internet of Things: Security,
2. Belattaf, S.; Mohammedi, M.; Omar, M.; Aoudjit, R. Issues, Threats, and Assessment of Different
Reliable and Adaptive Distributed Public-Key Cryptographic Technologies. Journal of
Management Infrastructure for the Internet of Things.
Communications. 19. 78. 10.12720/jcm.19.2.78-89.
Wirel. Pers. Commun. 2021, 120, 113–137.
16. Ahmad, Ijaz & Shahabuddin, Shahriar & Kumar, Tanesh
3. Pallavi Sethi, Smruti R. Sarangi, "Internet of Things:
Architectures, Protocols, and Applications", Journal of & Harjula, Erkki & Meisel, Marcus & Juntti, Markku &
Electrical and Computer Engineering, vol. 2017, Article Sauter, Thilo & Ylianttila, Mika. (2020). Challenges of AI
ID 9324035, 25 pages, 2017. in Wireless Networks for IoT. IEEE Industrial Electronics
[Link] Magazine. PP. 10.1109/MIE.2020.2979272.
4. Brockhaus, H.; Fries, S.; von Oheimb, D. Lightweight 17. Singh, M.K., Singh, A.K., Singh, P., Kalpana, Rishi,
Certificate Management Protocol (CMP) Profile; Internet O.P. (2023). Artificial Intelligence Enabled IOT System
Engineering Task Force: Fremont, CA, USA, 2021. for Football Identification in a Football Match. In: Garg,
5. Phillip Williams, Indira Kaylan Dutta, Hisham Daoud, D., Narayana, V.A., Suganthan, P.N., Anguera, J.,
Magdy Bayoumi,” A survey on security in internet of Koppula, V.K., Gupta, S.K. (eds) Advanced Computing.
things with a focus on the impact of emerging IACC 2022. Communications in Computer and
technologies”,Internet of ThingsVolume Information Science, vol 1782. Springer, Cham.
19,2022,100564, ISSN 2542-6605, [Link]
[Link] 5_37
6. Mohammed Ghazi Sami, Teba & Zeebaree, Subhi & 18. Asad, M.M., Naz, A., Shaikh, A. et al. Investigating the
Ahmed, Sarkar. (2023). A Comprehensive Review of impact of IoT-Based smart laboratories on students’
Hashing Algorithm Optimization for IoT Devices. academic performance in higher education. Univ Access
International Journal of Intelligent Systems and Inf Soc (2022). [Link]
Applications in Engineering. IJISAE, 2023, 11(6s. 205– 00944-1
231). 19. Taşkin, Deniz & Çetingöz, Mustafa. (2019). Designing a
7. Alam, Tanweer. 2023. "Blockchain-Based Internet of Gateway Device for Internet of Things Applications.
Things: Review, Current Trends, Applications, and Advances in Science and Technology Research Journal.
Future Challenges" Computers 12, no. 1: 6. 13. 79-87. 10.12913/22998624/103383.
[Link] 20. Apostolos Gerodimos, Leandros Maglaras, Mohamed
8. Arun Kumar Singh, Mahesh Kumar Singh, Pushpa Amine Ferrag, Nick Ayres, Ioanna Kantzavelou, IoT:
Choudhary, Pushpendra,(2023)” Future Technology Communication protocols and security threats, Internet
Internet of Things (IoT) in Smart Society 5.0” Intelligent of Things and Cyber-Physical Systems, Volume 3,2023,
Techniques for Cyber-Physical Systems (1st ed.) pp 245- Pages 1-13, ISSN 2667-3452,
266. CRC Press. [Link] [Link]

Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.

Common questions

Powered by AI

IoT-Crypto addresses the communication needs of IoT networks through a specialized communication protocol that utilizes a single DTLS connection, which is encrypted to enhance security. This framework is designed to handle the lightweight nature of IoT devices, which typically have limited processing capabilities and need efficient data transmission protocols. By integrating bespoke cryptographic certificates tailored for IoT devices, IoT-Crypto ensures secure authentication and authorization, whereas many other systems use identities primarily for authentication. Furthermore, the system's architecture consists of IoT subnets that conduct tasks through gateways acting as proxies to cloud servers, translating protocols and supporting communication using different standards. This setup minimizes the workload on IoT devices, focusing their functionalities on operational tasks while offloading cryptographic processing to gateways, thereby efficiently addressing the challenges of IoT communication .

In the IoT-Crypto network, gateways serve as pivotal elements that facilitate communication between IoT devices and cloud servers. They act as communication proxies that handle protocol translation and manage encryption and cryptographic trust checks. By offloading these tasks from individual IoT devices, gateways decrease the cryptographic processing burden on resource-limited devices, ensuring that they can focus on core operational tasks. This also enhances security, as gateways manage secure DTLS connections, enforce authentication protocols, and ensure encrypted data transfer. Thus, gateways are integral to maintaining a secure communication channel and efficiently coordinating data flow within the IoT-Crypto network .

IoT-Crypto's approach to cryptographic identity is distinct in that it employs these identities for encryption, authentication, and authorization, unlike many other IoT systems which often use identities solely for authentication. IoT-Crypto leverages bespoke cryptographic certificates designed specifically for IoT environments, allowing for significant flexibility in customizing and optimizing network operations and device connectivity. This comprehensive use of cryptographic identities supports a framework that builds trust relationships and manages secure communications effectively. The benefits of this approach include enhanced security, reduced risk of unauthorized access, and greater adaptability to the specific constraints and functional requirements of IoT devices .

The IoT-Crypto architecture consists of IoT subnets, gateways, and cloud servers, each playing a critical role in enhancing security and operational efficiency. IoT devices within subnets execute essential operations and communicate data through gateways, which act as proxies managing encryption and protocol translation. This setup allows for streamlined communication and minimizes the direct cryptographic workload on IoT devices. Gateways connect to cloud servers, which handle data processing, storage, and provisioning programmatic interfaces for outer systems. This segmented approach ensures robust security by utilizing encrypted DTLS connections and customized cryptographic identities, enabling comprehensive authentication, encryption, and authorization. The cloud layer's visibility and management of operations further enhance efficiency, allowing seamless interaction with authorized external users. Overall, this architecture offers a scalable, secure, and efficient framework tailored for diverse IoT deployments .

The implementation of IoT-Crypto optimizes computational overhead in IoT networks by offloading most cryptographic processes to gateway devices, which handle encryption and trust checks. This approach allows IoT devices to focus on operational tasks rather than exhaustive cryptographic operations, minimizing their technical workload. The design also supports running on various hardware platforms without significant increases in CPU or power usage. This is accomplished through the use of the MBED TLS library and the C programming language, which ensures efficient execution and maintenance of cryptographic functions. Additionally, the certificate verification process is highlighted as a major contributor to computational overhead, accounting for about 50% of it according to test results. Despite this, the overall system allows for the efficient performance of IoT devices without significantly impacting processing capacity .

In IoT-Crypto, cryptographic certificates play a crucial role in establishing secure communications through encryption, authentication, and authorization among IoT devices. Unlike traditional certificates like X.509, which are often used predominantly for authentication purposes, IoT-Crypto utilizes bespoke cryptographic certificates designed specifically for the IoT environment. These certificates enable more flexibility and customization of network operations and connectivity, optimizing for the unique constraints and requirements of IoT devices. The bespoke certificates are integral to maintaining trust relationships and managing device communication securely, leveraging encryption across various network layers .

The experiment results revealed that the IoT-Crypto protocol manages protocol message sizes efficiently, maintaining them well within the capabilities of IoT networks. The initial handshake for establishing a secure communication channel transmits 1639 bytes over the network, which is notably smaller than the X.509 certificate standard size of over 2000 bytes. Profiling these protocols using a C profiler showed that the peer certificate verification process significantly contributes to computational overhead, accounting for approximately 50% of it. Despite this, experiments demonstrated negligible impact on CPU usage and power consumption when cryptographic methods were employed, indicating that the IoT-Crypto system efficiently balances cryptographic security demands with network performance .

CBOR encoding is more suitable for IoT communication in the context of IoT-Crypto compared to JSON due to its binary format and stricter type control, which are beneficial for constrained IoT environments. CBOR provides a more compact and efficient data representation, leading to reduced transmission sizes and improved performance over typical JSON encoding. CoAP, another protocol often used in IoT, recommends CBOR encoding for these reasons, whereas HTTP is commonly associated with JSON. The ability of CBOR to outpace JSON in terms of resource efficiency makes it a preferred choice for IoT-Crypto where limited bandwidth and processing power are significant considerations .

IoT-Crypto's integration with automatic configuration tools streamlines network management by facilitating the automatic identification, configuration, and optimization of connected devices. These tools allow for efficient management of network topology, device removal, and secure operation adjustments without significant manual intervention. This approach enhances both the agility and security of IoT systems, as network adjustments and reconfigurations can be conducted dynamically in response to evolving operational demands. The use of such tools optimizes resource utilization and minimizes the risk of human error in configuring secure communication channels, greatly improving overall network efficiency and resilience .

IoT-Crypto sets the stage for future research by introducing a tailored cryptographic framework that emphasizes lightweight authentication, efficient encryption, and secure communication protocols in IoT networks. Its bespoke certificate formats and comprehensive implementation of cryptographic identities establish new baselines for enhancing authentication and data integrity across diverse IoT environments. This focus on integrating complex encryption mechanisms without compromising device performance can inspire further exploration into decentralized trust models, more efficient encoding methods like CBOR, and enhanced gateway functionalities. As IoT-Crypto addresses specific IoT challenges, its concepts may drive studies into hybrid security models combining existing IoT frameworks with emerging technologies like blockchain for bolstered security and trust management .

You might also like