A distributed security protocol designed for the context of Internet of Things

Abdelkader Laouid, Muath AlShaikh, Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Madani Bezoui, Habib Aissaoua, Abdelkamel Tari

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Future Networks and Distributed Systems, ICFNDS 2018
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450364287
DOIs
StatePublished - 26 Jun 2018
Externally publishedYes

Publication series

NameACM International Conference Proceeding Series

Bibliographical note

Publisher Copyright:
© 2018 ACM.

Keywords

  • Distributed algorithms
  • IoT
  • Security

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A distributed security protocol designed for the context of Internet of Things'. Together they form a unique fingerprint.

Cite this