Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-11-25
Vol. 19, No. 11 has been published online!
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
Home
>
Published Issues
>
2021
>
Volume 16, No. 8, August 2021
>
End-to-End Secure IoT Node Provisioning
Ilker Yavuz
1,2
and Berna Ors
1
1. Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, 34469, Turkey
2. AirTies Wireless Networks, Istanbul, 34394, Turkey
Abstract
—Security of Internet of Things (IoT) has been one of the most critical topics since IoT devices took part in daily life. Due to resource constrained nature of IoT networks, meeting requirements of a secure infrastructure always becomes a challenge. The most prevalent method is to rely on conventional application layer protocols to secure IoT network traffic but due to IoT device capabilities, limited mobile network resources and battery powered structure of IoT nodes, most of them are not applicable in practice. Provisioning a new node into a running network also suffers from these challenges. In this study, we investigate whether pure algorithm based protocols can be used to solve secure provisioning of resource limited IoT devices problem. Trusted IoT node provisioning requires new node authentication, authorization for network credentials, secret key generation for data privacy, and distribution of secret keys. Besides that, key management for rejoining nodes should be considered due to mobility of IoT nodes. We propose an Elliptic Curve Cryptography (ECC) based solution to cover these security requirements. Our design environment has also ability to analyze power consumption of each node during node enabling into a secure network.
Index Terms
—IoT, provisioning, bootstrapping, Elliptic Curve, digital signature, public key cryptography, power, security, COOJA, Contiki, Powertrace, wireless sensor networks
Cite: Ilker Yavuz and Berna Ors, "End-to-End Secure IoT Node Provisioning," Journal of Communications vol. 16, no. 8, pp. 341-346, August 2021. Doi: 10.12720/jcm.16.8.341-346
Copyright © 2021 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
5-T52
PREVIOUS PAPER
Analysis of Cross-Ocean Microwave Communication Systems Using Point-To-Point, Space Diversity and Hybrid Diversity Configurations
NEXT PAPER
Improvement of K-nearest Neighbors (KNN) Algorithm for Network Intrusion Detection Using Shannon-Entropy