< Back to previous page

Publication

HeComm: end-to-end secured communication in a heterogeneous IoT environment via fog computing

Book Contribution - Book Chapter Conference Contribution

© 2018 IEEE. In this paper we describe the HeComm (Heterogeneous Communication) architecture. The HeComm architecture utilizes fog computing to provide end-to-end secured communication between IoT nodes residing in networks that operate over different communication protocols. While the fog serves as a bridge between the heterogeneous networks, it does not have access to the confidential data that are being exchanged between the IoT nodes. The HeComm architecture can be divided into two parts: the HeComm protocol and the HeComm communication. The HeComm protocol allows IoT network managers to establish a secret key that is used in the HeComm communication. The HeComm communication secures the exchanged data between the IoT nodes by using object security. This enables an end-to-end protection of the communicated data without putting all trust in the fog. We evaluate the HeComm architecture through a security analysis and via a proof-of-concept implementation that connects an IoT node in a 6LoWPAN network to a node in a LoRaWAN network. The results indicate that the IoT nodes in the HeComm architecture meet the requirements of Class 1 constrained nodes. Furthermore, the HeComm architecture comprises a combination of widely used algorithms and protocols that are often supported in modern IoT devices and platforms, which facilitates the practical deployment of our solution.
Book: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)
Pages: 1 - 6
ISBN:9781538647905
Publication year:2018
BOF-keylabel:yes
IOF-keylabel:yes
Authors from:Higher Education
Accessibility:Closed