Analyzing the communication security between smartphones and IoT based on CORAS

Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian D. Jensen

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

The exponential growth of Internet-of-Things (IoT) devices and applications may expose tremendous security vulnerabilities in practice, as there are different protocols in the application layer to exchange sensor data, e.g., MQTT, AMQP, CoAP. For the MQTT protocol, IoT devices would publish a plain message that could potentially cause loss of data integrity and data stealing. Motivated by this, we first present a risk assessment on the communication channel between smartphones and IoT using the method of CORAS, which is a model-based security risk analysis framework. Then the paper analyzes several known cryptographic methods and mechanisms to identify which cryptography solution best fits resource constrained IoT devices. Further, we discuss appropriate cryptographic algorithms that can help protect data integrity between smartphones and IoT.
Original languageEnglish
Title of host publicationProceedings of 12th International Conference on Network and System Security
Volume11058
PublisherSpringer
Publication date2018
Pages251-265
ISBN (Print)9783030027438
DOIs
Publication statusPublished - 2018
Event12th International Conference on Network and System Security - Hong Kong Polytechnic University, Hong Kong, China
Duration: 27 Aug 201829 Aug 2018
Conference number: 12

Conference

Conference12th International Conference on Network and System Security
Number12
LocationHong Kong Polytechnic University
Country/TerritoryChina
CityHong Kong
Period27/08/201829/08/2018
SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11058
ISSN0302-9743

Keywords

  • CORAS
  • Data integrity
  • Internet-of-Things
  • Network security
  • Risk assessment
  • Smartphone security

Fingerprint

Dive into the research topics of 'Analyzing the communication security between smartphones and IoT based on CORAS'. Together they form a unique fingerprint.

Cite this