University of Limerick Institutional Repository

A secure end-to-end IoT solution

DSpace Repository

Show simple item record

dc.contributor.author Mathur, Avijit
dc.contributor.author Newe, Thomas
dc.contributor.author Elgenaidi, Walid
dc.contributor.author Rao, Muzaffar
dc.contributor.author Dooly, Gerard
dc.contributor.author Toal, Daniel
dc.date.accessioned 2017-07-19T15:19:48Z
dc.date.issued 2017
dc.identifier.uri http://hdl.handle.net/10344/5903
dc.description peer-reviewed en_US
dc.description.abstract The Internet of Things (IoT) has been expanding in recent years with advancements in technologies, techniques and devices. This expansion has led to several different applications in the medical, civil, marine, military and domestic domains. Each of these domains have different requirements and challenges, with one common denominator: data security. Data security is an important aspect for any IoT network, however, in modern IoT systems simple data security may be not sufficient. This paper looks at a secure end-to-end IoT solution that allows wireless sensors/devices to connect to any PC in the world while guaranteeing data and network security. The scheme proposed in this paper can protect an IoT solution against several attacks like data breach, Denial of Service (DoS) and unauthorized access. Results obtained show that the technologies implemented, or used are superior in terms of time and energy consumption when compared to their counterparts in previously published works en_US
dc.language.iso eng en_US
dc.publisher Elsevier en_US
dc.relation.ispartofseries Sensors and Actuators A: Physical;263, pp. 291-299
dc.relation.uri https://doi.org/10.1016/j.sna.2017.06.019
dc.rights This is the author’s version of a work that was accepted for publication in Sensors and Actuators A: Physical. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Sensors and Actuators A: Physical, 263, pp. 291-299, https://doi.org/10.1016/j.sna.2017.06.019 en_US
dc.subject secure IoT en_US
dc.subject sensor networks en_US
dc.subject data breach en_US
dc.subject HKDF (HMAC based Key Derivation Function) en_US
dc.subject ECDH (Elliptic Curve Diffie-Hellman) en_US
dc.subject WSN security en_US
dc.title A secure end-to-end IoT solution en_US
dc.type info:eu-repo/semantics/article en_US
dc.type.supercollection all_ul_research en_US
dc.type.supercollection ul_published_reviewed en_US
dc.identifier.doi 10.1016/j.sna.2017.06.019
dc.contributor.sponsor IRC en_US
dc.contributor.sponsor SFI en_US
dc.relation.projectid IRC-GOIPG/2013/1132 en_US
dc.relation.projectid 12/RC/2302 en_US
dc.relation.projectid 14/SP/2740 en_US
dc.date.embargoEndDate 2019-08-15
dc.embargo.terms 2019-08-15 en_US
dc.rights.accessrights info:eu-repo/semantics/embargoedAccess en_US
dc.internal.rssid 2723727


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULIR


Browse

My Account

Statistics