A lightweight IoT-based security framework for inventory automation using wireless sensor network

Isha Batra, Sahil Verma, Kavita, Mamoun Alazab

    Research output: Contribution to journalArticlepeer-review

    50 Citations (Scopus)

    Abstract

    Internet of things (IoT) has evolved as an innovation of next generation in this world of smart devices. IoT tends to provide services for data collection, data management, and data and device security required for application development. Things or devices in IoT communicate and compute to make our lives comfortable and safe. In inventory automation, real-time check on items, their information management, and status management, monitoring can be carried out using IoT. The huge amount of data that flows among the devices in the network demands for a security framework that ensures authentication, authorization, integrity, and confidentiality of data. The existing security solutions like SIMON or SPECK offer lightweight security solutions but are vulnerable to differential attack because of their simplicity. Moreover, existing solutions do not offer inbuilt authentication. Therefore, this research work contributes a secure and lightweight IoT-based framework using wireless sensor network (WSN) as a technology. The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator. The results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact.

    Original languageEnglish
    Article numbere4228
    JournalInternational Journal of Communication Systems
    Volume33
    Issue number4
    Early online date29 Oct 2019
    DOIs
    Publication statusPublished - 10 Mar 2020

    Fingerprint

    Dive into the research topics of 'A lightweight IoT-based security framework for inventory automation using wireless sensor network'. Together they form a unique fingerprint.

    Cite this