Proposing comprehensive security solutions for IoT networks by improving and integrating methods: DTLS, Quark encryption and Overhearing mechanism
Main Article Content
Abstract
With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is no truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices. Within the framework of this article, we introduce the research results and continue to propose security solutions for IoT networks by improving and integrating DTLS protocols, Quark hash function and Overhearing mechanism, installation, and testing on IoT network structure components, It shows the feasibility and effectiveness of the solution.
Keywords
Security, Leightweight Security, IOT, Wireless sensor networks, DTLS, Overhearing, Quark
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
[1] Nguyen Van Tanh, Ngo Quang Tri, Nguyen Gia Tuyen, Tran Quang Duc, Tran Hai Anh, Bui Trong Tung, The flooding attack in low power and lossy networks: a case study, the 7th International Conference on Smart Communications in Network Technologies”, Internet Engineering Task Force, El Oued, Algeria, October 2018. https://doi.org/10.1109/SaCoNeT.2018.8585451.
[2] Nguyen Van Tanh, Ngo Quang Tri, Nguyen Gia Tuyen, Nguyen Linh Giang, Nguyen Viet Tien, design a security system for internet of things with detecting and eliminating denial of service attack based on overhearing mechanism, the 3rd Symposium of Information Security, Vietnam Ministry of Information and Communication, Danang City, Vietnam, December 2018.
[3] Samonas S, Coss D, The CIA strikes back: redefining confidentiality, integrity and availability in security, Journal of Information System Security, vol 10, no 3 (2014), p. 21-45.
[4] Nguyen Van Tanh, Ngo Quang Tri, Nguyen Ngoc Cuong, Nguyen Linh Giang, Nguyen Anh Tuan, Design of comprehensive security solution on internet of things with improved DTLS protocol and overhearing mechanism, Fundamental Applied Information Technology Research, Vietnam Ministry of Information and Communication, Nha Trang, Vietnam, October 2020.
[5] Allan Pratt, CIA Triad and New Emerging Technologies: Big Data and IoT, Los Angeles City College and Consultant, 2015.
[6] Lovepreet Kaur Somal, IIKaranpreet Singh, Virk, Classification of distributed denial of service attacks – architecture, taxonomy and tools, Computer Science & Technology (IJARCST 2014).
[7] T Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.2. RFC 5246, Proposed Standard, Internet Engineering Task Force, 8/2008. https://doi.org/10.17487/rfc5246.
[8] J. Yashaswini, A review on IoT secrity issues and countermeasures, Orient Journal Computer Science and Technology 10.2 (2017): 454-459. http://dx.doi.org/10.13005/ojcst/10.02.28.
[9] Hai-Ying Zhou, Dan-Yan Luo, Yan Gao, De-Cheng Zuo, Modeling of node energy consumption for wireless sensor networks, Scientific Research, p18 – 23, 2011. https://doi.org/10.4236/wsn.2011.31003.
[10] Atul Kahate, Cryptography and Network Security, Third Edition, Computer Science, Pune University and Symbiosis International University, 2013.
[11] William J. Buchanan, Shancang Li, Rameez Asif, Lightweight cryptography methods, Journal of Cyber Security Technology, Volume 1, Issue 3 – 4, March 2018. https://doi.org/10.1080/23742917.2017.1384917.
[12] Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia, Quark: A Lightweight Hash, Nagravision S. A., Cheseaux, Switzerland, 2010.
[13] Bertoni G, Daemen J, Peeters M, Assche G V, On the indifferentiability of the sponge construction, Volume 4965 of LNCS, Springer (2008), p. 181–197.
[14] Mohammad Abdellatif, Power Consumption, Contiki Developer, 2017.
[2] Nguyen Van Tanh, Ngo Quang Tri, Nguyen Gia Tuyen, Nguyen Linh Giang, Nguyen Viet Tien, design a security system for internet of things with detecting and eliminating denial of service attack based on overhearing mechanism, the 3rd Symposium of Information Security, Vietnam Ministry of Information and Communication, Danang City, Vietnam, December 2018.
[3] Samonas S, Coss D, The CIA strikes back: redefining confidentiality, integrity and availability in security, Journal of Information System Security, vol 10, no 3 (2014), p. 21-45.
[4] Nguyen Van Tanh, Ngo Quang Tri, Nguyen Ngoc Cuong, Nguyen Linh Giang, Nguyen Anh Tuan, Design of comprehensive security solution on internet of things with improved DTLS protocol and overhearing mechanism, Fundamental Applied Information Technology Research, Vietnam Ministry of Information and Communication, Nha Trang, Vietnam, October 2020.
[5] Allan Pratt, CIA Triad and New Emerging Technologies: Big Data and IoT, Los Angeles City College and Consultant, 2015.
[6] Lovepreet Kaur Somal, IIKaranpreet Singh, Virk, Classification of distributed denial of service attacks – architecture, taxonomy and tools, Computer Science & Technology (IJARCST 2014).
[7] T Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.2. RFC 5246, Proposed Standard, Internet Engineering Task Force, 8/2008. https://doi.org/10.17487/rfc5246.
[8] J. Yashaswini, A review on IoT secrity issues and countermeasures, Orient Journal Computer Science and Technology 10.2 (2017): 454-459. http://dx.doi.org/10.13005/ojcst/10.02.28.
[9] Hai-Ying Zhou, Dan-Yan Luo, Yan Gao, De-Cheng Zuo, Modeling of node energy consumption for wireless sensor networks, Scientific Research, p18 – 23, 2011. https://doi.org/10.4236/wsn.2011.31003.
[10] Atul Kahate, Cryptography and Network Security, Third Edition, Computer Science, Pune University and Symbiosis International University, 2013.
[11] William J. Buchanan, Shancang Li, Rameez Asif, Lightweight cryptography methods, Journal of Cyber Security Technology, Volume 1, Issue 3 – 4, March 2018. https://doi.org/10.1080/23742917.2017.1384917.
[12] Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia, Quark: A Lightweight Hash, Nagravision S. A., Cheseaux, Switzerland, 2010.
[13] Bertoni G, Daemen J, Peeters M, Assche G V, On the indifferentiability of the sponge construction, Volume 4965 of LNCS, Springer (2008), p. 181–197.
[14] Mohammad Abdellatif, Power Consumption, Contiki Developer, 2017.