Dr Mohammad Abdussami, an Assistant Professor in the Department of Computer Science and Engineering, has made a significant contribution to the field of Internet of Things (IoT) security with the publication of his paper titled “APDEAC-IoT: Design of Lightweight Authenticated Key Agreement Protocol for Intra and Inter-IoT Device Communication Using ECC with FPGA Implementation.” This groundbreaking research has been published in the esteemed Q1 journal Computers and Electrical Engineering, which boasts an impact factor of 4.
Dr Abdussami’s research addresses critical security challenges faced by IoT devices, particularly in facilitating secure communication between intra and inter-device networks. The lightweight authenticated key agreement protocol he has developed utilizes Elliptic Curve Cryptography (ECC) and Field-Programmable Gate Array (FPGA) implementation to enhance the security framework of IoT ecosystems.
As the adoption of IoT devices continues to expand across various sectors, the importance of robust security protocols cannot be overstated. Dr Abdussami’s work is poised to make a substantial impact on how devices communicate safely and efficiently, ensuring the integrity and confidentiality of data transmitted over the network.
As the demand for secure IoT solutions continues to grow, Dr Abdussami’s research stands as a beacon for future developments in this crucial area, potentially paving the way for safer and more efficient IoT interactions globally.
Abstract:
In this research work, we proposed a fog-enabled network architecture integrated with IoT devices (Intra and Inter-domain IoT devices) and developed the DEAC-IoT scheme using Elliptic Curve Cryptography (ECC) for secure authentication and key agreement. Our protocol is designed to protect device-to-device communication from security threats in resource-constrained IoT environments.
Citation format:
Abdussami Mohammad, Sanjeev Kumar Dwivedi, Taher Al-Shehari, P. Saravanan, Mohammed Kadrie, Taha Alfakih, Hussain Alsalman, and Ruhul Amin. “DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation.” Computers and Electrical Engineering 120 (2024): 109696.
Explanation of the Research in Layperson’s Terms:
With more and more devices connecting wirelessly through the Internet of Things (IoT) (think of smart home gadgets, wearables, etc.), keeping their communications secure has become a big priority. However, many current communication methods for IoT devices don’t provide strong enough security. This leaves them open to cyber-attacks.
The challenge is to create a security system that is safe from attacks and doesn’t require too many computations. This is important because IoT devices often have limited resources (like low battery power or slower processors).
In this research, the authors have devised a solution: a new type of network setup (called fog-enabled architecture) that connects IoT devices with each other and with external devices. They’ve also developed a security protocol called DEAC-IoT, which uses Elliptic Curve Cryptography (ECC)—a highly efficient method for securing communications.
Their system makes it easier for IoT devices to authenticate (verify each other’s identity) and securely exchange keys (used to encrypt data), all while being lightweight enough to run on devices that don’t have a lot of processing power or energy.
In short: the paper offers a way to securely connect IoT devices with minimal computations, making communication between devices safe from hackers, even in environments where cyber threats are common.
Practical Implication and Social Implications Associated:
The practical implementation of this research can strengthen the security of IoT devices across many sectors, from homes and cities to healthcare and industries. The proposed DEAC-IoT scheme can also be used to implement vehicle to vehicle secure communication in autonomous vehicles, VANETs and Internet of Vehicles scenario.
Socially, it can enhance trust in IoT technology, protect privacy, safeguard critical infrastructure, and promote economic and technological development—while ensuring security remains affordable even in resource-constrained environments.
In Industrial IoT (IIoT) Scenario: In industries where machines are connected via IoT (such as in factories), devices need to communicate securely to ensure the smooth running of production lines. The DEAC-IoT protocol could secure these communications, preventing industrial espionage or sabotage.
Future Research Plans
1. Design of group key authentication protocols for IoT devices communication.
2. Design of handover authentication protocols for Fog-enabled IoT devices communication.
3. Design of quantum safe authentication protocols for vehicle-to-vehicle communication
Collaborations:
1. Dr Sanjeev Kumar Dwivedi, Centre of Artificial Intelligence, Madhav Institute of Technology and Science (MITS), Gwalior, Madhya Pradesh 474005, India.
2. Dr Taher Al-Shehari, Computer Skills, Department of Self-Development Skill, Common First Year Deanship, King Saud University, 11362, Riyadh, Saudi Arabia.
3. Dr Mohammed Kadrie, Computer Skills, Department of Self-Development Skill, Common First Year Deanship, King Saud University, 11362, Riyadh, Saudi Arabia
4. Dr P Saravanan, Department of Electronics and Communication Engineering, PSG College of Technology, Coimbatore, India.
5. Dr Ruhul Amin, Department of Computer Science & Engineering, IIIT Naya Raipur, Naya Raipur 493661, Chhattisgarh, India
6. Dr Taha Alfakih, Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
7. Dr Hussain Alsalman, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia