Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Oct 28;20(21):6131.
doi: 10.3390/s20216131.

Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study

Affiliations

Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study

Mamun Abu-Tair et al. Sensors (Basel). .

Abstract

Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested.

Keywords: IoT; data anonymisation; lightweight cryptography; privacy preservation; security; smart home.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Architecture of a secure and privacy-preserving IoT-based sensing and actuation system in a smart home.
Figure 2
Figure 2
Schematic of the testbed showing physical connectivity.
Figure 3
Figure 3
A comparison of the achieved encryption time (in ms) by several legacy and lightweight cryptography algorithms.
Figure 4
Figure 4
A comparison of the achieved decryption time (in ms) by several legacy and lightweight cryptography algorithms.

References

    1. Stankovic J.A. Research Directions for the Internet of Things. IEEE Internet Things J. 2014;1:3–9. doi: 10.1109/JIOT.2014.2312291. - DOI
    1. Alladi T., Chamola V., Sikdar B., Choo K.R. Consumer IoT: Security Vulnerability Case Studies and Solutions. IEEE Consum. Electron. Mag. 2020;9:17–25. doi: 10.1109/MCE.2019.2953740. - DOI
    1. Links C. The Internet of things will change our world. Ercim News. 2015;101:76.
    1. Green H. How The Internet Of Things Will Change (And Improve) Our Everyday Lives. [(accessed on 27 October 2020)]; Available online: https://www.forbes.com/sites/ibm/2016/10/04/how-the-internet-of-things-w....
    1. Ismagilova E., Hughes L., Dwivedi Y.K., Raman K.R. Smart cities: Advances in research—An information systems perspective. Int. J. Inf. Manag. 2019;47:88–100. doi: 10.1016/j.ijinfomgt.2019.01.004. - DOI

LinkOut - more resources