SlideShare a Scribd company logo
1 of 23
Authors :
Balkis BETTOUMI and Ridha BOUALLEGUE
1Split Croitia 13/09/2018
2
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 Wireless Sensor Network(WSN) is
the promise architecture of
Internet of Things(IoT).
 WSN is composed by tiny
devices(sensors, or actuators)
with low battery power
 Integration of WSN in IoT brings
a new architecture with high
level of security
requirements
IoT networks
3Split Croitia 13/09/2018
 IP-based security infrastructures are too
heavy to operate on tiny sensor nodes
 Lightweight and efficient cryptographic
primitives are required.
 Elliptic Curve Cryptography (ECC) is
becoming a standard security component for
WSNs
 ECC achieves the same security strength
with much smaller key size
4Split Croitia 13/09/2018
 HIP Diet EXchange (HIP-DEX) protocol is
primarily designed for computation or
memory-constrained sensor/actuator devices
 Revolution in the authentication process by
using Elliptic Curve Cryptography
 Current Protocols are not designed to be
suitable with IoT networks
5Split Croitia 13/09/2018
 Goal of this paper
◦ Authentication process between the end user and
the sensor.
◦ Currently available protocols do not respond to IoT
requirements
◦ Implementing HIP-DEX protocol in an IoT network
◦ Demonstrating the encouraging results of this
protocol.
6Split Croitia 13/09/2018
7
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 Security of communications between nodes in
WSN is critical
 Difficulty or even impossibility for human
Intervention after deployment of sensors
 Authentication is performed more often than
bootstrapping in WSN
 Studying Authentication mechanism is based on
number of exchanged messages, bytes and the
total computing time
8Split Croitia 13/09/2018
 Two authentication mechanisms based on
crypthography:
◦ symmetric cryptosystem
◦ asymmetric cryptosystem
 The symmetric cryptosystem is based on
a shared key between the sender and the receiver.
 Authentication schemes based on simple
symetric cryptographic primitives are suitable to
WSN.
9Split Croitia 13/09/2018
 The asymmetric cryptosystem uses a public
key and a private
◦ the sender signs a message with the private key
and
◦ The receiver authenticate it by the respective public
key.
 Sensors are unable to perform heavy
cryptographic operations like classical
asymmetric algorithms (RSA, Diffie-
Hellman,...).
10Split Croitia 13/09/2018
11
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 Developped to address the problems caused
by the dual-role of IP addresses as identifiers
and locators.
 HIP integrates host mobility and multihoming
in a simple and elegant way
 Elliptic Curve Cryptography (ECC) is the best
calculation method for generating key
materiel with few operation
12Split Croitia 13/09/2018
 HIP-DEX 4 Way-Handshake
HIP-DEX 4 Way-Handshake
13Split Croitia 13/09/2018
 IoT Network access using HIP-DEX
◦ The Initiator I first performs a standard HIP-DEX with
the responder R.
◦ HIP-DEX mutually authenticates I and R and creates a
session key from a static Diffie-Hellman key exchange
◦ DoS protection to R through its puzzle mechanism.
◦ Use of the node’s HIT by the Responder to generate a
polynomial share F(HITA, y) from the secret bivariate
polynomial F(x, y) and the nodes HIT
14Split Croitia 13/09/2018
15
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 Real expriment scenario
◦ Initiator: Intel(R)Core(TM) i5-4210U CPU @1.70GHz
2.40GHz equiped with Ubuntu 12.04 LTS(32-bit)
◦ Responder: which is a Raspberry Pi 3 Model B, 1GB RAM
with ARMv71 processor
◦ Wi-Fi connection
◦ Putty access to Raspberry
Testbed Architecture
16Split Croitia 13/09/2018
17
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 Execution of the HIP-DEX 4 Way-Handshake
50 times(200 exchanged messages between I
and R were captured)
 Association time is equal to timestamp of the
authentication response minus timestamp of
the association request( R2 message
reception time by the end-user minus I1
message sending time by the device)
18Split Croitia 13/09/2018
 Avearge of the 4-Way handshake(association
time) of HIP-DEX protocol does not exceed 30ms
 Authentication computing time executed by HIP-
DEX shows an improvement with 3% comparing
with other solutions
HIP-DEX 4 Way Handshake latency time
19Split Croitia 13/09/2018
 Average time association time of studied
solutions
◦ Protocol proposed by Mohamed Hammi, Erwan Livolant, Patrick Bellot,
Ahmed Serhrouchni, Pascale Minet: 37.504ms
◦ Scheme proposed by Omar Cheikhrouhou, Anis Kouba,
Manel Boujelben, Mohamed Abid:1128ms
◦ DTLS-Based protocol 2048 bits propsed by Thomas
Kothmayr, Corinna Schmitt, Wen Hu, Michael Brnig, and Georg Carle :
859 ms
Our implementation: 30ms
20Split Croitia 13/09/2018
21
1 Introduction
Authentication in WSN
HIP-DEX: a promessing candidate for IoT
Experimental Results
Conclusion
Experimental Setup
2
3
4
5
6
Split Croitia 13/09/2018
 In this paper, we:
◦ analyzed security features of HIP-DEX protocol, an
IETF Internet draft, and also evaluated its overhead in
terms computing latency on a real IoT network
◦ proved the feasibility of the end user authenticaton to
access a WSN using HIP-DEX protocol
 An evaluation of our implementation is being
done in a multi-hop IoT network. Studying the
attack risks that can occur in the 4 exchanged
messages of HIP-DEX will be conducted in order
to evaluate its security performance in a global
and real authentication scheme in an IoT
networks.
22Split Croitia 13/09/2018
balkis.bettoumi@enit.utm.tn
23Split Croitia 13/09/2018

More Related Content

What's hot

Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
 
Overview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTOverview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTBrain IoT Project
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
Knightsbridge Wireless COmmunication's brief profile
Knightsbridge Wireless COmmunication's  brief profileKnightsbridge Wireless COmmunication's  brief profile
Knightsbridge Wireless COmmunication's brief profileThomas Chanian
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM France Lab
 
How could Smart Contracts affect the Insurance Industry?
How could Smart Contracts affect the Insurance Industry?How could Smart Contracts affect the Insurance Industry?
How could Smart Contracts affect the Insurance Industry?George Theofilis
 
EVPN Case Study
EVPN Case StudyEVPN Case Study
EVPN Case StudyRubyLink
 
AI +電腦視覺+嵌入式系統
AI +電腦視覺+嵌入式系統AI +電腦視覺+嵌入式系統
AI +電腦視覺+嵌入式系統艾鍗科技
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGAnitin3940
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel Bessie Wang
 
Distributed Ledgers and IoT
Distributed Ledgers and IoTDistributed Ledgers and IoT
Distributed Ledgers and IoTTiE Bangalore
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Chuck Bair
 
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)Open Mobile Alliance
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
IoT on the Edge
IoT on the EdgeIoT on the Edge
IoT on the EdgeFIWARE
 

What's hot (20)

Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Overview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoTOverview of the WP4 of BRAIN-IoT
Overview of the WP4 of BRAIN-IoT
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Knightsbridge Wireless COmmunication's brief profile
Knightsbridge Wireless COmmunication's  brief profileKnightsbridge Wireless COmmunication's  brief profile
Knightsbridge Wireless COmmunication's brief profile
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
How could Smart Contracts affect the Insurance Industry?
How could Smart Contracts affect the Insurance Industry?How could Smart Contracts affect the Insurance Industry?
How could Smart Contracts affect the Insurance Industry?
 
EVPN Case Study
EVPN Case StudyEVPN Case Study
EVPN Case Study
 
seminar
seminarseminar
seminar
 
AI +電腦視覺+嵌入式系統
AI +電腦視覺+嵌入式系統AI +電腦視覺+嵌入式系統
AI +電腦視覺+嵌入式系統
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Distributed Ledgers and IoT
Distributed Ledgers and IoTDistributed Ledgers and IoT
Distributed Ledgers and IoT
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?
 
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
IoT on the Edge
IoT on the EdgeIoT on the Edge
IoT on the Edge
 

Similar to Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in io t context

Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based ApplicationsSadegh Dorri N.
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
Privacy and security aspects on a Smart City IoT Platform
Privacy and security aspects on a Smart City IoT PlatformPrivacy and security aspects on a Smart City IoT Platform
Privacy and security aspects on a Smart City IoT PlatformPaolo Nesi
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
Iot & digital services platform in skiing station cwin18_toulouse
Iot & digital services platform in skiing station cwin18_toulouseIot & digital services platform in skiing station cwin18_toulouse
Iot & digital services platform in skiing station cwin18_toulouseCapgemini
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...IJECEIAES
 
Bat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBATbern
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTBMST
 

Similar to Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in io t context (20)

Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based Applications
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Privacy and security aspects on a Smart City IoT Platform
Privacy and security aspects on a Smart City IoT PlatformPrivacy and security aspects on a Smart City IoT Platform
Privacy and security aspects on a Smart City IoT Platform
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Iot & digital services platform in skiing station cwin18_toulouse
Iot & digital services platform in skiing station cwin18_toulouseIot & digital services platform in skiing station cwin18_toulouse
Iot & digital services platform in skiing station cwin18_toulouse
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from Patents
 
Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...
 
Bat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchain
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMST
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in io t context

  • 1. Authors : Balkis BETTOUMI and Ridha BOUALLEGUE 1Split Croitia 13/09/2018
  • 2. 2 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 3.  Wireless Sensor Network(WSN) is the promise architecture of Internet of Things(IoT).  WSN is composed by tiny devices(sensors, or actuators) with low battery power  Integration of WSN in IoT brings a new architecture with high level of security requirements IoT networks 3Split Croitia 13/09/2018
  • 4.  IP-based security infrastructures are too heavy to operate on tiny sensor nodes  Lightweight and efficient cryptographic primitives are required.  Elliptic Curve Cryptography (ECC) is becoming a standard security component for WSNs  ECC achieves the same security strength with much smaller key size 4Split Croitia 13/09/2018
  • 5.  HIP Diet EXchange (HIP-DEX) protocol is primarily designed for computation or memory-constrained sensor/actuator devices  Revolution in the authentication process by using Elliptic Curve Cryptography  Current Protocols are not designed to be suitable with IoT networks 5Split Croitia 13/09/2018
  • 6.  Goal of this paper ◦ Authentication process between the end user and the sensor. ◦ Currently available protocols do not respond to IoT requirements ◦ Implementing HIP-DEX protocol in an IoT network ◦ Demonstrating the encouraging results of this protocol. 6Split Croitia 13/09/2018
  • 7. 7 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 8.  Security of communications between nodes in WSN is critical  Difficulty or even impossibility for human Intervention after deployment of sensors  Authentication is performed more often than bootstrapping in WSN  Studying Authentication mechanism is based on number of exchanged messages, bytes and the total computing time 8Split Croitia 13/09/2018
  • 9.  Two authentication mechanisms based on crypthography: ◦ symmetric cryptosystem ◦ asymmetric cryptosystem  The symmetric cryptosystem is based on a shared key between the sender and the receiver.  Authentication schemes based on simple symetric cryptographic primitives are suitable to WSN. 9Split Croitia 13/09/2018
  • 10.  The asymmetric cryptosystem uses a public key and a private ◦ the sender signs a message with the private key and ◦ The receiver authenticate it by the respective public key.  Sensors are unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie- Hellman,...). 10Split Croitia 13/09/2018
  • 11. 11 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 12.  Developped to address the problems caused by the dual-role of IP addresses as identifiers and locators.  HIP integrates host mobility and multihoming in a simple and elegant way  Elliptic Curve Cryptography (ECC) is the best calculation method for generating key materiel with few operation 12Split Croitia 13/09/2018
  • 13.  HIP-DEX 4 Way-Handshake HIP-DEX 4 Way-Handshake 13Split Croitia 13/09/2018
  • 14.  IoT Network access using HIP-DEX ◦ The Initiator I first performs a standard HIP-DEX with the responder R. ◦ HIP-DEX mutually authenticates I and R and creates a session key from a static Diffie-Hellman key exchange ◦ DoS protection to R through its puzzle mechanism. ◦ Use of the node’s HIT by the Responder to generate a polynomial share F(HITA, y) from the secret bivariate polynomial F(x, y) and the nodes HIT 14Split Croitia 13/09/2018
  • 15. 15 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 16.  Real expriment scenario ◦ Initiator: Intel(R)Core(TM) i5-4210U CPU @1.70GHz 2.40GHz equiped with Ubuntu 12.04 LTS(32-bit) ◦ Responder: which is a Raspberry Pi 3 Model B, 1GB RAM with ARMv71 processor ◦ Wi-Fi connection ◦ Putty access to Raspberry Testbed Architecture 16Split Croitia 13/09/2018
  • 17. 17 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 18.  Execution of the HIP-DEX 4 Way-Handshake 50 times(200 exchanged messages between I and R were captured)  Association time is equal to timestamp of the authentication response minus timestamp of the association request( R2 message reception time by the end-user minus I1 message sending time by the device) 18Split Croitia 13/09/2018
  • 19.  Avearge of the 4-Way handshake(association time) of HIP-DEX protocol does not exceed 30ms  Authentication computing time executed by HIP- DEX shows an improvement with 3% comparing with other solutions HIP-DEX 4 Way Handshake latency time 19Split Croitia 13/09/2018
  • 20.  Average time association time of studied solutions ◦ Protocol proposed by Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet: 37.504ms ◦ Scheme proposed by Omar Cheikhrouhou, Anis Kouba, Manel Boujelben, Mohamed Abid:1128ms ◦ DTLS-Based protocol 2048 bits propsed by Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brnig, and Georg Carle : 859 ms Our implementation: 30ms 20Split Croitia 13/09/2018
  • 21. 21 1 Introduction Authentication in WSN HIP-DEX: a promessing candidate for IoT Experimental Results Conclusion Experimental Setup 2 3 4 5 6 Split Croitia 13/09/2018
  • 22.  In this paper, we: ◦ analyzed security features of HIP-DEX protocol, an IETF Internet draft, and also evaluated its overhead in terms computing latency on a real IoT network ◦ proved the feasibility of the end user authenticaton to access a WSN using HIP-DEX protocol  An evaluation of our implementation is being done in a multi-hop IoT network. Studying the attack risks that can occur in the 4 exchanged messages of HIP-DEX will be conducted in order to evaluate its security performance in a global and real authentication scheme in an IoT networks. 22Split Croitia 13/09/2018