Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach

The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G, as a communication architecture for the IoT. The concept of adaptive security is adopted, which is based on adjust...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal Vol. 7; no. 7; pp. 6589 - 6602
Main Authors: Hellaoui, Hamed, Koudil, Mouloud, Bouabdallah, Abdelmadjid
Format: Journal Article
Language:English
Published: Piscataway IEEE 01-07-2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G, as a communication architecture for the IoT. The concept of adaptive security is adopted, which is based on adjusting the security level as per the changing context. It has the potential of reducing energy consumption by adapting security rather than always considering the worst case, which is energy consuming. The consideration of 5G introduces new dynamics that can be exploited to perform more adaptation. The proposed solution introduces an intelligence in the application of security, from the establishment phase to the use phase (end-to-end). The security level related to the used cryptographic algorithm/key is adapted for each node during the establishment phase, so to match with the duration of the provided services. A new strategy is formulated that considers both IoT and 5G characteristics. In addition, a solution based on the framework of the coalitional game is proposed in order to associate the deployed objects with the optimized security levels. Moreover, the application of security is also adapted during the use phase according to the threat level. Trust management is used to evaluate the threat level among the network nodes, while existing works focus on performing the adaptation during the use phase. The proposed approach achieves more adaptation through the consideration of both IoT and 5G dynamics. The analysis and performance evaluations are conducted to show the effectiveness of the proposed end-to-end approach.
ISSN:2327-4662
2372-2541
2327-4662
DOI:10.1109/JIOT.2020.2974618