Search results

1 – 2 of 2
Article
Publication date: 16 August 2021

Umakant L. Tupe, Sachin D. Babar, Sonali P. Kadam and Parikshit N. Mahalle

Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green…

Abstract

Purpose

Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green IoT. The IoT devices sense, gather and send out significant data from their ambiance. This exchange of huge data among billions of devices demands enormous energy. Green IoT visualizes the concept of minimizing the energy consumption of IoT devices and keeping the environment safe.

Design/methodology/approach

This paper attempts to analyze diverse techniques associated with energy-efficient protocols in green IoT pertaining to machine-to-machine (M2M) communication. Here, it reviews 73 research papers and states a significant analysis. Initially, the analysis focuses on different contributions related to green energy constraints, especially energy efficiency, and different hierarchical routing protocols. Moreover, the contributions of different optimization algorithms in different state-of-the-art works are also observed and reviewed. Later the performance measures computed in entire contributions along with the energy constraints are also checked to validate the effectiveness of entire contributions. As the number of contributions to energy-efficient protocols in IoT is low, the research gap will focus on the development of intelligent energy-efficient protocols to build up green IoT.

Findings

The analysis was mainly focused on the green energy constraints and the different robust protocols and also gives information on a few powerful optimization algorithms. The parameters considered by the previous research works for improving the performance were also analyzed in this paper to get an idea for future works. Finally, the paper gives some brief description of the research gaps and challenges for future consideration that helps during the development of an energy-efficient green IoT pertaining to M2M communication.

Originality/value

To the best of the authors’ knowledge, this is the first work that reviews 65 research papers and states the significant analysis of green IoT.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 2 November 2015

Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative…

196

Abstract

Purpose

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.

Design/methodology/approach

This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.

Findings

The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.

Research limitations/implications

Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.

Originality/value

The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 2 of 2