JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network
Chung, Jin Hee; Cho, Tae Ho;
  PDF(new window)
 Abstract
The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.
 Keywords
Internet of things;security service;SSL/TLS;IoT security;MQTT;fuzzy logic;
 Language
Korean
 Cited by
1.
OAuth 2.0 기반 CoAP 인증 프레임워크 연구 동향 및 제안,김경한;임현교;허주성;한연희;

정보와 통신, 2016. vol.33. 12, pp.41-47
 References
1.
K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667, 2013.

2.
A. Banks and R. Gupta, "MQTT Version 3.1.1," OASIS Standard, 2014.

3.
E. Rescorla, SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Reading, 2001.

4.
IoT Forum, "The Classification and Security Requirements based on IoT Device Capabilities," IoTFS-0081, 12.1, 2015.

5.
T. Dierks, "The transport layer security (TLS) protocol version 1.2," 2008.

6.
J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998.

7.
R. Babuska, "Fuzzy Systems, Modeling and Identification," Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg, vol. 4, 1996.

8.
N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," Mobile Computing, IEEE Transactions on, vol. 5, pp. 128-143, 2006. crossref(new window)

9.
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS constraints," in Communications, 2002. ICC 2002. IEEE International Conference on, 2002, pp. 2053-2057, 2002.