Abstract
With Cisco estimating that 50 billion of Internet of Things (IoT) nodes will be connected to the Internet by 2020, the exponential growth of BGP routing tables and mobility issues will be the two major problems in the Internet.
Recently, the Locator Identifier Separation Protocol (LISP) has been proposed as an efficient approach for dealing with the problem of scalable Internet routing. Unfortunately, the anticipated advantage of using LISP as an overlay to support IoTs communications comes with serious security challenges. In IoTs, nodes will be communicating across different networking technologies which deploy different
security measures, such as authentication and encryption mechanisms. Such heterogeneity increases the attack surface and leaves IoTs’ nodes more susceptible to attacks.
This highlights the need for a unified security framework for heterogeneous IoTs. This paper provides an overview of our research to address some of the IoTs’ security challenges. It proposes a new Node-to-Node (N2N) authentication and key agreement protocol as part of a unified security framework. The underlying protocols of the proposed framework have been formally verified using Casper/FDR, a well-known model checker, and they have been proven to meet a number of desired security properties.
Dr Mahdi Aiash
Dr Mahdi Aiash is with the School of Science and Technology, Middlesex University. Dr Aiash is involved in a number of research projects nationally and internationally. His main interest is in the area of Secure Future Internet, Network and Cyber Security. He is a computer security researcher & practitioner with industry, academic, and research experience. He is an active contributor to the academic as well as broader international community working on Information and Network Security issues. Dr Aiash has published in excess of 50 peer reviewed papers in prestigious journals and conferences; he is a recipient of a number of "Best Research Paper Awards". Dr Aiash presently maintains nearly two dozen certifications including Ethical/White Hat Hacker, Licenced Pen-tester and Information Security Officer. He has also conducted workshops and corporate trainings around the world apart from his speaking engagements. Qualifications: Doctor of Philosophy (PhD) in Security and QoS for Heterogeneous networks, 2012; Master of Science (with Distinction) in Computer Networks and Secuirty, 2008; BEng of Electical Engineering, Computing Department, 2004; PGCert-HE.
More articles by Dr Mahdi
How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs
In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empiric…
19 January 2018On Assessing the Impact of Ports Scanning on the Target Infrastructure
In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-dept…
25 April 2018