An effective handling of secure data stream in IoT

An effective handling of secure data stream in IoT

Accepted Manuscript Title: An Effective Handling of Secure Data Stream in IoT Author: Jaejin Jang Im.Y Jung Jong Hyuk Park PII: DOI: Reference: S1568...

807KB Sizes 345 Downloads 230 Views

Accepted Manuscript Title: An Effective Handling of Secure Data Stream in IoT Author: Jaejin Jang Im.Y Jung Jong Hyuk Park PII: DOI: Reference:

S1568-4946(17)30273-9 http://dx.doi.org/doi:10.1016/j.asoc.2017.05.020 ASOC 4224

To appear in:

Applied Soft Computing

Received date: Revised date: Accepted date:

27-1-2017 20-4-2017 8-5-2017

Please cite this article as: Jaejin Jang, Im.Y Jung, Jong Hyuk Park, An Effective Handling of Secure Data Stream in IoT, (2017), http://dx.doi.org/10.1016/j.asoc.2017.05.020 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

Jaejin Janga , Im.Y Junga,∗, Jong Hyuk Parkb,∗ a School

ip t

An Effective Handling of Secure Data Stream in IoT

us

cr

of Electronics Engineering, Kyungpook National University, 80 Daehakro, Daegu 41566, South Korea b Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 01811, South Korea

Abstract

an

Internet-of-Things (IoT) applications are a primary domain for data streams, which travel through a heterogeneous network consisting of the Internet and low-speed IoT to be sent to a data collector. However, when a large data

M

stream is transmitted, overhead results from the difference between the speed and maximum transfer unit of IoT and the existing Internet. The overhead increases as data size increases. This problem is a critical factor for IoT devices

d

that are sensitive to power consumption and data streams that must be handled

te

in real time. To solve this problem, we compressed the data stream using a low-density parity check (LDPC) code. Since compression using the LDPC code can be applied even when the data stream is encrypted, the compression

Ac ce p

can be used in applications requiring privacy or confidentiality. Therefore, this study proposes a method to improve the usability of encrypted data streams in the IoT environment. We implemented IoT devices that generated data streams using Raspberry Pi, a desktop computer, and collectors that collect data streams. The results of experiments using temperature sensor data show that the communication time for data stream transmission decreased by 56.1– 75.5%. In addition, the power consumption of IoT devices for data transmission decreased by 54.8-75.3%. In order to perform compression handling by the IoT device, the maximum memory usage and CPU usage increased by 0.3% ∗ Corresponding

author Email address: [email protected], [email protected] (Jong Hyuk Park)

Preprint submitted to Applied Soft Computing

April 18, 2017

Page 1 of 37

and 10.1%, respectively. As a result of this research, it is expected that the transmission time to collectors, as well as the power consumption of IoT devices,

ip t

can be reduced while securing data streams generated by IoT devices.

cr

Keywords: Secure Data Stream, IoT, Usability

1. Introduction

us

The Internet of Things (IoT) is a key domain in which data streams are generated, and the volume of this data is expected to increase [1, 2, 3, 4, 5, 6,

5

an

7, 8, 9]. A data stream has an unbounded size, the rate at which the data is generated varies widely, and the data must be processed online or in near real– time [5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20]. A data stream collector

M

collects data streams, and the collected information is processed to determine its knowledge or value [21]. When a data stream generated from an IoT device is transmitted to a collector, the data stream traverses a heterogeneous network composed of the IoT and Internet. The IoT often uses a slow network such

d

10

as Bluetooth Low Energy (BT-LE), ZigBee, or Z-wave to accommodate the

te

limited resources of IoT devices, while the Internet uses fast networks such as Ethernet or Wi-Fi [22]. In addition, since the IoT network has a small

Ac ce p

maximum transfer unit (MTU), as the size of data to be transmitted increases,

15

the number of fragmentations and reassemblies for transmission increase sharply compared to the Internet. Table 1 lists the speeds and MTUs of the Internet and IoT [23, 24, 25, 26, 27, 28, 29, 30]. Owing to this difference in network performance, when data is transmitted

from IoT devices to the Internet, most of the transmission time is consumed in

20

the IoT network.

Fig. 1 shows the proportion of transmission time consumed when various

sizes of data are transmitted from the low-speed IoT to the Internet. As seen in the figure, when transmitting to the collector, most of the time is consumed by the transmission to an IoT border router. Table 2 shows that this process 25

consumes more than 80% of the transmission time in the IoT network.

2

Page 2 of 37

Table 1: Speeds and MTUs of Internet and IoT networks

10 MB-107 GB/s

1500

802.11ac(Wi-Fi)

454 MB-7.26 GB/s

2304

Z-Wave

40-100 KB/s

ZigBee

250 KB/s

Bluetooth Low Energy

1 MB/s

ip t

802.3(Ethernet)

127

127 27

Ac ce p

te

d

M

an

IoT

MTU(bytes)

cr

Internet

Speed

us

Network

Figure 1: Specific weight of transmission time in Internet and low speed IoT

Table 2: Specific weight rates of transmission time

Data Size (KB)

Rate (%)

100

100

200

87.09

400

89.58

800

95.66

1600

90.09

3

Page 3 of 37

Table 3: CPU, RAM, and power of IoT prototype platform

CPU

RAM

Raspberry Pi

ARM BCM2835

256-512 MB

Arduino

ATMEGA8, ATMEGA168

16-32 KB

AM335x 1GHz

512 MB

ARM CoretexA8 PhidgetSBC

Udoo(Quad)

Freescale i.MX6Quad

7-12 V/USB

5V

64 MB

6-15 V

1 GB

6-15 V

an

Phidgets

us

BeagleBone Black

5 V/USB

cr

ATMEGA328, ATMEGA1280

POWER

ip t

Name

4 ARM CoretexTM–A9

Atmel SAM3X8E ARM

M

CortexM3 CPU

Increases in transmission time and fragmentation/reassembly tasks depend-

d

ing on the data size are critical to IoT devices. This is because IoT devices have

te

limited resources and are sensitive to power consumption [31]. Table 3 lists the specifications of the devices used to implement a popular IoT prototype [32]. 30

As seen in the table, the central processing unit (CPU) used is slower than a

Ac ce p

desktop or laptop, the RAM is smaller, and the power operates at a low voltage level [33].

To solve this problem, we propose a handler that can improve the usability

of the data stream. This method can be applied to an encrypted data stream,

35

as well as applications requiring security. By compressing the data stream using low-density parity check (LDPC) codes, the size of the data stream is reduced and transmission speeds up as the size decreases. A reduction in transmission time can help to satisfy the characteristics of

the data stream, which should be processed in real time and reduce the power 40

consumption of the IoT device. A variety of studies have been conducted to overcome the differences between Internet and IoT networks, but the research has focused on increasing the pay4

Page 4 of 37

load by compressing the header of each protocol. However, in this study, we solved the problem by compressing the payload itself rather than the header, even if the payload was encrypted.

ip t

45

The results of experiments with IoT devices and collectors using Raspberry

cr

Pi and a desktop computer show that the average transmission time to a col-

lector was reduced by 61.63%, while the average power consumption of an IoT

50

us

device was reduced by 61.08%. The CPU and memory usage for performing the proposed handling increased by 0.50% and 0.30%, respectively, for a data size

an

of 1600 KB, which was the largest usage.

The contributions of this study are as follows:

• Reduced transmission time to data stream collector.

The data stream has characteristics that should be processed in real time.

M

55

In order for the data stream to be processed, it must first be collected into

d

a collector. In an IoT environment, however, the data stream is delayed owing to network differences. We reduced the delay by an average of

60

te

61.63% by compressing data using an LDPC code. This can help satisfy the data stream characteristics that need to be processed quickly.

Ac ce p

• Reduced power consumption of IoT devices. Since an IoT network uses a slow network such as BT-LE, ZigBee, or Zwave, the transmission time increases significantly when the size of the transmitted data stream increases. In addition, because these slow net-

65

works have small MTUs, fragmentations and reassemblies for data transmission also increase. This increase is a critical factor in IoT devices that are resource constrained and sensitive to power consumption. We reduced the power consumption for data stream transmission by compressing the data stream to reduce its size. Thus, the power consumption for a data

70

stream that should be transmitted frequently can be reduced. In order to perform the proposed handling, the Raspberry Pi has a run time of less than 1 s, and an increase in memory and CPU usage is acceptable. 5

Page 5 of 37

• Payload compression studies of packets. Studies aimed at reducing the network performance gap between the IoT and Internet have focused on the header compression of packets. In con-

ip t

75

trast, this study investigated the payload compression of packets. This

cr

method is applicable even if the payload is encrypted. This new approach

could provide a new approach for existing research that focuses only on

80

us

header compression.

This paper is organized as follows; Section 2 explains background for our studybasic terminology and theories. In Section 3, we discuss related works.

an

In Section 4, we propose a method for effective handling of secure data stream. Section 5 presents the experiments and analysis, including implementation, ex-

85

study and discuss future work.

d

2. Background

M

perimental method, and interpretation of results. In Section 6, we conclude our

te

In order to understand related research, this section describes the IoT net-

Ac ce p

work structure and its basic terminology and theories.

90

N etwork architecture of the IoT : Fig. 2 shows an example of an IPv6

network and a 6LoWPAN network [34]. All hosts, including hosts in 6LoWPAN, have IPv6 addresses. Each router is responsible for routing between hosts in the sub network and external hosts. In this study, a device in the 6LoWPAN network in Fig. 2 generates the data stream, and the server is a collector that

95

collects the data stream.

IP v6 over Low − P ower W P AN (6LoW P AN ): 6LoWPAN is a low-power

network that supports IPv6 and is based on IEEE 802.15.4 [35]. In the case of IPv4, which is currently widely used, addresses cannot be given to IoT devices owing to a lack of address space. IPv6 is applied to solve this problem [36]. It

100

is based on IEEE 802.15.4, a standard network for low-power devices to satisfy the low-power characteristics of IoT devices. 6

Page 6 of 37

Constrained Application P rotocol(CoAP ): CoAP is a protocol for supporting the application layer in resource-limited devices such as IoT devices [37].

105

ip t

It is based on User Datagram Protocol (UDP) communication in the transport layer and optionally supports Datagram Transport Layer Security (DTLS), an

cr

IoT security protocol.

Distributed Source Coding: Distributed source coding is used to reduce

us

network traffic in applications such as sensor networks [38]. Fig. 3 shows a

Ac ce p

te

d

M

an

block diagram of distributed source coding when there are two sources [38].

Figure 2: Example of IPv6 and 6LoWPAN network

110

Each source is independently encoded, but decoding is performed at the

same time. In this figure, roles are defined for each block as follows: X: Data stream generated from the IoT device Y: Private key distributed between the IoT device and data stream collector X Encoder: IoT border router

7

Page 7 of 37

ip t cr

115

Y Encoder: IoT border router Ideal Channel: Internet (Ethernet, Wi-Fi)

us

Figure 3: Example of distributed source cording with two sources

an

Joint decoder: A data stream collector that collects data streams

In this study, it is assumed that the secret key is distributed or agreed upon in advance. Therefore, the value of Y is distributed to the IoT device and the

M

120

Ac ce p

te

d

data stream collector in advance, and the Y encoder does nothing.

Figure 4: Example of decoding with (6,3) LDPC codes

LDP C Codes: An LDPC code is an error-correction code of (n, k), where

the matrix has a size of [(n − k × n)]. Each element has a value of 0 or 1, and the

125

weight of 1 is low. Generally, LDPC codes are used as error-correction codes, but in this study, data is compressed using LDPC codes [39]. Fig. 4 shows an example of compression using LDPC codes [40]. H denotes an LDPC code, r denotes a received data bit, and z denotes a syndrome. In general use, it is determined whether the result of z is 0 to verify if decoding is performed correctly.

130

However, in this study, the LDPC code plays the role of compressing data. In this example, the data of (101011) is compressed to (000). There are values 8

Page 8 of 37

compressed to (000), such as (000000) and (001110), apart from (101011). On the receiving side, the compressed data is decompressed by selecting the correct

135

ip t

value from among the plurality of values mapped to the received syndrome using the characteristics of the IoT device and the data. This process is explained in

cr

detail in related works.

us

3. Related works

This section describes related research. Section 3.1 describes the study of data streams related to security and time delays. Section 3.2 explains a study related to IoT protocol header compression. Section 3.3 details studies related to data compression using LDPC codes.

an

140

M

3.1. Study of data streams related to security and time delay Recently, several data stream security studies have been conducted. In [41],

145

d

researchers proposed an efficient real-time security verification model that uses a variable key length for the data stream. Secret key cryptography was targeted,

te

and the key length was defined as 128, 64, and 32 bits. However, it is more reasonable to use a stream cipher if we consider the nature of the unbounded

Ac ce p

data stream and the performance of the IoT device. In this study, we consider stream ciphers that match the characteristics of data streams. In addition to

150

encryption, compression also reduces the transmission time to the data stream collector. This improves the characteristics of the data stream that need to be processed quickly.

3.2. Study to improve the difference between IoT and Internet In [42], researchers studied the compression of Internet Protocol security

155

(IPsec) protocol headers in 6LoWPAN. Since IPsec operates at the network layer, it has the advantage of ensuring the confidentiality and integrity of the transport layer header, unlike a transport layer security protocol such as TLS.

9

Page 9 of 37

IPsec consists of an Authentication Header (AH) that handles data integrity and authentication, and an Encapsulating Security Payload (ESP) that provides data confidentiality, authentication, and integrity.

ip t

160

AH using HMAC-SHA1-96 as an authentication function was compressed

cr

from 24 bytes to 16 bytes; ESP using AES-CBC as a cryptographic function was compressed from 18 bytes to 12 bytes; and ESP using AES-CBC and HMAC-

165

us

SHA1-96 was compressed from 30 bytes to 24 bytes. AH saved 8 bytes, ESP with encryption saved 6 bytes, and ESP with encryption and authentication saved 6 bytes.

an

ESP's limitation is that the header of the upper layer [Transmission Control Protocol (TCP) or UDP] is encrypted, and hence cannot be compressed. To

d

M

solve this problem, a new algorithm that can compress and encrypt is required.

170

te

Figure 5: IPsec ESP format

Fig. 5 shows the encrypted and authenticated parts when using ESP [43]. As

Ac ce p

shown in this figure, the data part and the ESP Trailer part are encrypted. The data part contains the header of the upper layer (TCP, UDP) but is encrypted and becomes impossible to compress. In [37], researchers studied the header compression of DTLS for CoAP. DTLS

175

was used as a security protocol for CoAP. DTLS was internally divided into a Record layer and a Handshake layer. The Record header was compressed from 104 bytes to 40 bytes, and the Handshake was compressed from 96 bytes to 24 bytes. This saved 64 bytes in the Record header and 72 bytes in the Handshake header. In the initial message of the DLTS connection, the ClientHello message

180

was compressed from 336 bytes to 264 bytes, and the ServerHello message was compressed from 304 bytes to 264 bytes. In [30], researchers defined a standard for compressing IPv6 packets across IEEE 802.15.4. This document detailed the contents of Section 10 of [30]. IEEE 10

Page 10 of 37

802.15.4 has 127 MTUs, whereas for IPv6 packets, the MTU has 1280 bytes. If 185

a host outside IEEE 802.15.4 sends a single IPv6 packet that is larger than 127

ip t

bytes to a host inside IEEE 802.15.4, it needs to be fragmented and reassembled within the IEEE 802.15.4 network for transmission. The study defined how

cr

to increase the size of a transmitted payload by compressing IPv6 headers in an IEEE 802.15.4 network. In addition, LOWPAN HC1 and LOWPAN HC2,

which are proposed in [30], were improved. LOWPAN IPHC defines how to

us

190

compress unique, local, and multicast IPv6 addresses and hop limit values. LOWPAN NHC is a method for compressing the Next Header. In the case of

an

link-local communications showing the greatest compression, it was possible to compress to 2 bytes. When communicating with an external network, it can be 195

compressed to 7 bytes. The size of a typical IPv6 header is 40 bytes.

M

This study also defined compression for UDP headers. The port number was compressed to 4 bits. In addition, the researchers saved 2 bytes when using tunneling by omitting the checksum value of UDP when the message integrity

In [31], researchers addressed the transmission of IPv6 packets in BT-LE

te

200

d

check value can be guessed.

communications. Section 3.2.3 defines the header compression. In the case

Ac ce p

of link-local communication, the source and destination addresses of IPv6 can be omitted because the IPv6 address can be inferred by using the neighbor cache as an entry containing the destination’s interface identifier (IID) and the

205

equipment address.

When communicating with external devices, a case was defined wherein the

source address and destination prefix can be omitted. If the context defines a prefix for the global IPv6 address of a slave Bluetooth device, then the 6LoWPAN Border Router/master relaying the communication with the external de-

210

vice assigns the prefix to the device, and the value of the address and IID can be seen from the neighbor cache. Therefore, the source address can be omitted. If the connection context is defined for an IPv6 destination address, it can be omitted because the prefix of the destination can be computed from the connection context. 11

Page 11 of 37

215

In [31, 42, 37, 30], researchers studied the compression of headers. References [42] and [37] addressed the header compression of the security protocols IPsec

ip t

and DTLS in 6LoWPAN networks, while [31] and [44] discussed IPv6 header compression in IEEE 802.15.4 networks and IPv6 header compression in BT-LE

220

cr

networks.

Unlike these studies, the present work deals with payload compression rather

us

than header compression. Compression utilities such as Gzip, bzip, 7z, and zip cannot be compressed if the data stream is encrypted for security reasons. To

an

solve this problem, we compressed the encrypted data stream using LDPC codes. 3.3. Compression with LDPC codes 225

In this section, we discuss data compression studies using LDPC codes. We

M

prove that encrypted data compression is not possible with a conventional compression utility.

d

3.3.1. Encrypted data compression using Gzip

Data compression is the reduction of redundancies in data. The encrypted data was further tested with Gzip for various data [45]. Table 4 lists the results.

te

230

We added the encryption of AES–128 in various operating modes. The

Ac ce p

original data are zero values and are compressed using the OpenSSL command [46]. The encryption key is ”EncryptedData. The compression method is the same as [45], with Gzip applying the most powerful compression option -9.

235

As seen in Table 4, it can be confirmed that the encrypted and random

data cannot be compressed except for Tarball, zipfile, and JPEG, which are already compressed and have low compression efficiency and Electronic Codebook (ECB) operation modes. Owing to the meta-information for the compression utility, the size of the data increases.

240

The ECB operation mode has good compression efficiency because it divides the data into same-sized blocks and then encrypts with the same key. Since zero values are used as the original data before the encryption, in the ECB operation mode, each divided block has the same value and is encrypted with the same

12

Page 12 of 37

ip t cr

Size(bytes)

Compressed size(bytes)

Binary zeros

1048576

1057

Wikipedia XML

1048576

H.P. Lovecraft Text

1048576

gdb ELF64

1048576

an

us

Table 4: Results of data compression on various file formats

Random ASCII Hex

1048576

607628

Base64 random data

1048576

796856

Tarball

1048576

1039974

1048576

1041544

JPEG

402926

406290

M

d te

Zipfile

359184

1048576

1047418

1048576

1048761

AES-128-CBC

1048576

1048795

AES-128-CFB

1048608

1048779

AES-128-CTR

1048592

1048779

AES-128-ECB

1048608

2149

AES-128-OFB

1048592

1049779

Ac ce p

Random binary data

13

Page 13 of 37

encryption key. Thus, the encrypted blocks all have the same value. As a result, 245

ECB operation mode has good compression efficiency. Fig. 6 shows the ECB

d

M

an

us

cr

ip t

operation mode [47].

te

Figure 6: Block cipher ECB operation mode

Whether the data can be compressed well can be easily determined by check-

Ac ce p

ing the data entropy [48]. Entropy is equal to the likelihood of guessing the data. If entropy is low, then it is easy to guess, which means that a considerable

250

amount of similar data is coming out. If the entropy is high, then the opposite is true. Eq. 1 is a formula for calculating data entropy. P(xi) denotes the probability of xi in the entire data, b denotes the number of kinds of data, and xi denotes the i-th data.

H(x) = −

n X

P (xi ) logb P (xi )

(1)

i=1

The entropy was calculated using Eq. 1 to check whether the data used in 255

Table 4 can be compressed. Table 5 shows the results. The random binary data has two outputs, so b = 2 in Eq. 1. In the case of AES128 encoded data, b = 2128, but for the reality of calculation, b = 256, which is a byte unit. 14

Page 14 of 37

Table 5: Results of entropy calculation on various file formats

Random binary data

1.00000

AES-128-CBC

7.999838

AES-128-CFB

7.999809

AES-128-CTR

7.999862

AES-128-ECB

4.000491

AES-128-OFB

7.999825

cr

0

an

us

Binary zeros

ip t

Entropy(bits)

The results confirm that the encryption (except for the random binary and

260

M

ECB) has the same entropy as the basic unit. In the case of the random binary, there are two cases with output 0 and 1. It can be seen that the entropy is 1 bit, so it is impossible to make a complete guess. Ciphers other than the ECB

d

operation mode also have uniform output with no specific pattern since they

te

have 8 bits of entropy. In the case of ECB, we can confirm that compression can be made easier by having 4-bit entropy, which is half the level of other ciphers, 265

as in the compression results in Table 4.

Ac ce p

The above results show that the encrypted data cannot be compressed by a

general compression utility. However, it is possible to compress encrypted data using LDPC codes.

3.3.2. Compression with LDPC codes

270

In [49], researchers studied the compression of binary data using LDPC

codes. The compression method coincides with the syndrome concept described in Section 2, and the data flow also has the same structure as in Fig. 3. In this study, we assume that each bit has a different probability of X and Y that is less than 50%. However, the assumption that X and Y differ by less than 50%

275

is not consistent with the assumption of our study because Y must be randomly generated as a key stream used for encryption. In addition, it is confirmed that

15

Page 15 of 37

Rx ≥ H(X|Y ) Ry ≥ H(Y |X)

ip t

(2)

Rx + Ry ≥ H(X, Y )

cr

LDPC performs better than turbo code, which is another error-correcting code. The researchers in [50] also studied compression using LDPC codes, but they

method for unattributed data has not been explicitly described.

d

M

an

280

us

focused on general data compression rather than specific data. A decompression

te

Figure 7: Example of Slepian-Wolf region

In [38], researchers proposed code generation to efficiently solve the decoding

Ac ce p

problem of distributed source encoding. In applications such as sensor networks, distributed source coding is required to eliminate unnecessary traffic in the network. They proposed block code generation that could achieve any point in

285

the SlepianWolf region for any associated sources using only a single code. The Slepian-Wolf region determines the region with the lossless compressible coding rate for two or more sources. For two sources, the coding rate is given by Eq. 2 and is shown in Fig. 7.

In [51], researchers studied the compression of encrypted data for the first

290

time. Distributed source coding was applied by considering the encrypted data and key as the respective sources. The receiver could decompress and decrypt the encrypted data by performing simultaneous decoding using the received encrypted data and key. The code used for distributed source coding was the LDPC code proposed in [38]. As a result, they encrypted a 100 × 100 binary 16

Page 16 of 37

295

image where only 706 pixels were 1, compressed to a rate of 1/2, and decompressed without loss. The encryption was performed simply on the bitwise XOR

ip t

by the random key stream. However, the data used in the simulation was not realistic.

300

cr

In [52], researchers studied the lossless compression of an encrypted grayscale

image. They proposed Resolution Progressive Compression to compress more

us

efficiently. The statistical value of the picture sampled at low resolution was used as additional information, while gradually increasing the resolution of the picture. The image was encrypted by XOR with the key stream in bit.

305

an

In [53], researchers studied the lossless compression of encrypted color and grayscale images. Unlike [51], this study considered spatial correlations between pixels in an image. For a grayscale image, it proposed compression of neighbor-

M

ing pixels by considering the association with the bit plane, and compression of the color image using the correlations between different color bands. Most of the studies have used compression with LDPC codes for picture files. A picture file is a good example because it has a spatial correlation between color

d

310

te

bands and pixels. However, in this research, it is impossible to use the resolution progressive compression used in previous studies, or the correlation between the

Ac ce p

pixel and the color band, because the IoT device compresses the generated data. We used the characteristics of IoT devices and data to select the correct values

315

for decompression.

4. Effective handling of secure data stream This section describes the proposed data stream handler to increase usability.

Section 4.1 describes the flow of the data stream. Section 4.2 explains the transmission of data streams from an Internet device. Section 4.3 explains how

320

to decompress the received data stream. 4.1. Data stream flow Fig. 8 shows the transmission flow of the data stream. The data stream arrives at the data stream collector via the IoT border router from the IoT 17

Page 17 of 37

ip t

cr

Figure 8: Data flow between IoT device and data stream collector

device. BT-LE, ZigBee, and Z-wave, which are slow and have low MTU, are used between the IoT device and IoT border router. Between the router and

us

325

collector, Ethernet and Wi–Fi–which are high speed and high MTU–are used. The IoT device transmits data on a regular basis, or by a request message such

an

as Update, or whenever data is generated [54, 55, 56, 57]. The transmitted data stream may be optionally transmitted in plaintext or encrypted using encryption to transmit the data.

Ac ce p

te

d

4.2. Transmission in IoT device

M

330

Figure 9: Data transmission mechanism in IoT end device

Fig. 9 shows the transmission of the data stream from the IoT device. It is

appropriate to use a stream cipher for the encryption algorithm because the data stream has unbounded boundaries, and the stream cipher has a faster processing

335

speed than a block cipher. In addition, since the IoT device is a resource-limited device, a stream cipher with a simple structure is more suitable than a block cipher. It is appropriate to apply lightweight stream ciphers for devices with limited resources such as Grain, Trivium, MICKEY, and WG-8 [58, 59, 60, 61]. Fig. 10 shows an example where 1 byte of data with a value of 27 (00011011

340

binary) is encrypted with a keystream and compressed using LDPC codes. 18

Page 18 of 37

ip t cr us

an

Figure 10: Example of data transmission mechanism in IoT Border Router

(00011011) is encrypted by the XOR operation with the key stream (01010000)

M

generated based on the previously distributed seed. AND is compressed using the (2,1) LDPC code. In this example, it is read in 2-bit units and processed as 1 bit. (00,11) is processed as (0), and (01,10) is processed as 1 and compressed to a value of (1010). The LDPC code for 2 bits can be sufficiently stored if it

d

345

te

has space to store the 2 × 2 matrix. Each element of the matrix can be stored as 32 bytes if stored as ASCII code, or 4 bits if matched to 1 bit. In this study, the LDPC code table was not created but embedded in program code.

Ac ce p

We can apply the above procedure to all data streams and perform zero

350

padding if necessary. The application of the encryption algorithm is optional or as needed. Compressed data that is half the size is sent. Unless the secret key is exposed, the security of the data is not compromised even when the compressed data is transmitted.

4.3. Receiving in data stream collector

355

Fig. 11 shows the process of decompressing the received 4 bits of data into

the original data. Each bit in the bitstream 1010 may have two outputs: (0) can have (00,11), and (1) can have (01,10). Since 4 bits are needed to decompress 1 byte, the following 16 bytes can be generated: 01000100, 01000111, 01001000, 01001011, 01110100, 01110111, 1111000, 01111011, 10000100, 10000111, 10001000,

19

Page 19 of 37

ip t cr us

Figure 11: Example of receiving data in data stream collector

10001011, 10110100, 10110111, 10111000, and 10111011.

an

360

The key stream is XOR the 16 outputs to perform decryption (00010100, 00010111, 00011000, 00011011, 00100100, 0100111, 00101000, 00101011, 11010100,

M

11010111, 11011000, 11011011, 10100100, 10100111, 10101000, and 10101011). Unless the encryption key is exposed, it cannot be decrypted with the correct value, so there is no hindrance to security. AND decides the value of results by

d

365

using the sensor characteristic of the IoT device and general output value.

te

As an example of the temperature data used in the experiment, the temperature sensor can measure between 40 and 125 ◦ C with SHT75 [62]. Therefore,

Ac ce p

it is possible to exclude those that fall outside the effective range (10010100,

370

11010111, 10100100, 10100111, 10101000, 10101011) falling to 40 ◦ C. At the

position where this sensor is installed, since the temperature is always in the second half of the range of 20 ◦ C, only (00011011) can be valid data. This

process decompresses the data compressed with the LDPC code. If encryption is not applied, it is performed without XOR the key stream.

375

5. Experiments and analysis 5.1. Implementation In this section, we implemented the IoT device, IoT border router, and data stream collector.

20

Page 20 of 37

Table 6: Specifications of Raspberry Pi 2 and Desktop

Desktop

OS

Raspbian Jessie

Ubuntu 16.04 LTS

CPU

4-core BCM2836

Intel i5 CPU 2.80 Ghz 4

RAM

1 GB

10 GB

Network

Bluetooth Low Energy (USB)

Wired Ethernet

cr

IoT device: The IoT device was implemented using Raspberry Pi 2. We

an

380

us

Wired Ethernet

ip t

Raspberry Pi 2

used 6LoWPAN, which utilizes BT-LE, and IoT SDK for this purpose [63]. The sending program used the modified Python example provided in [58], and the

M

compression was written in C. The LDPC code used for compression was created using the LDPC code library [64]. 385

IoT border router: The IoT border router was also implemented using Rasp-

d

berry Pi 2. We installed the [63] IoT SDK to support BT-LE and 6LoWPAN in

te

the same way as the IoT devices. The connection to the data stream collector was connected by wired Ethernet.

Data stream collector: The data stream collector used was a desktop computer running on the operating system Ubuntu 16.04 LTS. The collection pro-

Ac ce p 390

gram was created by modifying the Python example in [63]. Dataset: The dataset used data to monitor the activity of the accredited

data repository [65]. Home monitoring was one of the main applications of the IoT. This data consisted of eight gas sensors, temperature sensors, and humidity

395

sensors. We used a temperature data list.

The specifications of the Raspberry Pi 2 and desktop computer are listed in

Table 6.

21

Page 21 of 37

5.2. Measured element for experiment In order to prove the efficiency of the proposed handler, we defined the

ip t

400

following four measurement factors:

cr

• Transmission time: the time at which data is transmitted to the collector. • Data compression time: The time it takes to perform additional compres-

405

us

sion, data compression for the proposed handling.

• Resource consumption: The amount of RAM and CPU usage the IoT

an

device uses to compress data, an additional task.

• Power consumption: The measure of the power consumed for data transmission.

410

M

In order to improve the performance of these four measurement factors, the transmission time after the handling application should be faster than the

d

transmission time before the handling application. The transmission time after handling should include the compression time, and the resource and power

te

consumption of the IoT device for this task should be accommodated. Since the problem to be solved in this study depends on data size, the data set was divided into 100 KB, 200 KB, 400 KB, 800 KB, and 1600 KB.

Ac ce p

415

5.3. Transmission time

Fig. 12 shows the transfer time to the collector before and after applying

the proposed compression handler. The time after handling application does not include the compression time. As seen in this figure, the transmission time

420

decreased for all data sizes. As shown in Table 7, the reduction is 56% at 100 KB, 75% at 200 KB, 62% at 400 KB, 56% at 800 KB, and 57% at 1600 KB. Thus, it is confirmed that this reduction in transmission time can help satisfy the characteristics of the data stream that need to be processed quickly. In addition, network resources can be saved [66].

22

Page 22 of 37

ip t cr us an M

Ac ce p

te

d

Figure 12: Comparison of transmission times

Table 7: Transmission time reduction rate

Data Size (KB)

Reduction Rate (%)

100

56.09

200

75.70

400

62.38

800

56.79

1600

57.21

23

Page 23 of 37

ip t cr us an

425

M

Figure 13: Compression time

5.4. Compression Time

Fig. 13 shows the time taken to compress the data stream. The larger the

d

data size, the longer the time. However, even if the data size increases, the

te

compression time within 0.5 s for the data size was required. The compression of the largest data size of 1600 KB took 0.337 s. In addition, the transmission time result of Section 5.3 was much smaller than the time before compression,

Ac ce p

430

even if the compression time was added. Therefore, this can help satisfy the characteristics of the data stream to be processed in real time by reducing the overall transmission time. 5.5. Resource Usage

435

Table 8 shows the amount of resources consumed when compressing data.

Memory and CPU usage were monitored and measured using the Linux TOP command. VIRT refers to virtual memory usage, RES refers to physical memory usage, SHR refers to shared memory usage, MEM represents the total increase in RAM usage, and CPU represents the total increase in CPU usage.

440

The results in the table show that as the size of compressed data increased, the amount of memory, CPU, and RAM used in the compression process in24

Page 24 of 37

Table 8: Memory and CPU usage for compression task

VIRT(KB)

RES(KB)

SHR(KB)

MEM(%)

CPU(%)

100

1964

328

272

0.0

200

2020

1284

1020

0.1

400

2424

1656

1020

0.2

800

3024

2156

1060

0.2

6.3

1600

4224

2972

1080

0.3

10.5

ip t

Data Size(KB)

1.0 1.0

us

cr

3.6

(3)

an

P ower Consumption(W ) = T ransmission T ime × 1.253 + Compression T ime × 1.44

creased. However, if we compare this result to the resource usage of the basic

M

processes lxpanel, sshd, and systemd that operate in the same environment, we can confirm that the amount of resources used is not large. The memory usage 445

of the three processes are as follows: lxpanel (VIRT: 94804, RES: 24796, SHR:

d

20960), sshd (VIRT: 12208, RES: 3180, SHR: 2512), and systemd (VIRT:23884, RES:3196, SHR:2684). Compared to other processes, it is evident that the com-

te

pression process consumed less memory. CPU usage increased by 10.5% for the data size of 1600 KB. However, since the compression process took only a very short time, the effect of the increase was negligible.

Ac ce p

450

5.6. Power Consumption

IoT devices are power-sensitive devices operating at low power. Therefore,

it is meaningful to reduce the power consumption of IoT devices. Fig. 14 shows the power consumption before and after applying the protocol. It seen in this

455

figure that power consumption significantly decreased. The power consumption was calculated using the following equation: We measured the power consumption of the data stream transmission and compression process using a power meter. Power consumption was 1.253 W when the data stream was transmitted, and 1.44 W when the compression pro-

460

cess was performed.

25

Page 25 of 37

ip t cr us an M

Ac ce p

te

d

Figure 14: Comparison of power consumption

Table 9: Power consumption reduction rates

Data Size (KB)

Reduction Rate (%)

100

54.77

200

75.30

400

62.04

800

56.40

1600

56.89

26

Page 26 of 37

6. Conclusion

ip t

In this paper, we proposed a handling method that reduced transmission time in a data collector and the power consumption of IoT devices that generate data streams, while maintaining the security of the encrypted data stream.

The encryption algorithm used for security considered the stream cipher and

cr

465

compressed the data using an LDPC code to overcome the differences in perfor-

us

mance between the IoT and the Internet. Using the Raspberry Pi 2, a desktop computer, and data stream collector, we implemented an IoT device that generated a data stream. Based on the data from a temperature sensor, the average transmission time to the collector was reduced by 61.63%, and the power con-

an

470

sumption of the Iot device was reduced by an average of 61.08%. The measured

M

CPU and memory usage for performing the proposed handling showed a 0.30% and 10.50% increase in memory and CPU usage, respectively, for the largest a data size of 1600 KB. The results of this study are expected to help reduce the power consumption of IoT devices within a certain range of output, and satisfy

d

475

the characteristics of data streams in order to process them quickly. Future

te

research will explore not only the output within a certain range, but also how to apply the compression to general data.

Ac ce p

We examined the data stream of the IoT (temperature, humidity, and power

480

meter), which generated a certain range of values. However, this required knowledge of the characteristics of the data and devices, which were collected in advance. In addition, since the applications of the IoT are expected to be diverse, and more diverse data will be generated in the future, the above conditions are expected to limit the applications of this study [11]. Therefore, future work will

485

focus on how to compress and decompress general data using LDPC codes. This method will be based on the belief propagation algorithm proposed in [51]; in contrast to our method, which is based on the characteristics of the device and data stream. Future studies will be able to reduce both the transmission time to the collector and the power consumption of the IoT device, while maintaining

490

the security of the encrypted data stream for various IoT devices, by making

27

Page 27 of 37

the handling method applicable to the general data stream.

ip t

Acknowledgements

This work was supported by the National Research Foundation of Korea

References

us

495

cr

(NRF) grant funded by the Korea government (MSIP) (No 2016R1A2B4011069).

[1] M. Chen, S. Mao, Y. Liu, Big data: A survey, Mobile Networks and Ap-

an

plications 19 (2) (2014) 171–209. doi:10.1007/s11036-013-0489-0. [2] C. Liu, C. Yang, X. Zhang, J. Chen, External integrity verification for outsourced big data in cloud and iot: A big picture, Future Generation Computer Systems 49 (August 2015) (2015) 58–67. doi:10.1016/j.future.

M

500

2014.08.007.

d

[3] B. Shen, Y. Liu, X. Wang, Research on data mining models for the internet

te

of things, in: Int. Conf. Image Anal. Signal Process, 2010, pp. 127–132. [4] C. Tsai, C. Lai, M. Chiang, L. Yang, Data mining for internet of things: A survey, IEEE COMMUNICATIONS SURVEYS TUTORIALS 16 (1)

Ac ce p

505

(2014) 77–79. doi:10.1109/SURV.2013.103013.00206.

[5] F. Chen, P. Deng, J. Wan, D. Zhang, A. V. Vasilakos, X. Rong, Data mining for the internet of things: Literature review and challenges, International Journal of Distributed Sensor Networks 2015 (Article ID 431047). doi:

510

10.1155/2015/431047.

[6] W. Fan, A. Bifet, Mining big data: Current status, and forecast to the future, SIGKDD Explorations 14 (2). doi:10.1145/2481244.2481246.

[7] S. Kolozali, M. Bermudez-Edo, D. Puschmann, F. Ganz, P. Barnaghi, A knowledge-based approach for real-time iot data stream annotation and 515

processing, in: 2014 IEEE International Conference on Internet of Things

28

Page 28 of 37

(iThings 2014), Green Comp uting and Communications (GreenCom2014),

ip t

and Cyber-Physical-Social Computing (CPSCom 2014), 2014, pp. 215–212. [8] E. Baccarelli, N. Cordeschi, A. Mei, M. Panella, M. Shojafar, J. Stefa,

Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: Review, challenges,

cr

520

and a case study, IEEE Network March/April 2016 (2016) 54–61. doi:

us

10.1109/MNET.2016.7437025.

[9] A. Zaslavsky, C. Perera, D. Georgakopoulos, Sensing as a service and

525

an

big data, in: International Conference on Advances in Cloud Computing (ACC), 2012.

[10] B. Gedik, S. Schneider, M. Hirzel, K. Wu, Elastic scaling for data

M

stream processing, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 25 (6) (2014) 1447–1463. doi:10.1109/TPDS.

[11] K. P. Lakshmi, C. Reddy, A survey on different trends in data streams,

te

530

d

2013.295.

in: International Conference on Networking and Information Technology

Ac ce p

(ICNIT), 2010.

[12] J. Han, Y. Chen, G. Dong, J. Pei, B. Wah, J. Wang, Y. Cai, Stream cube: An architecture for multi-dimensional analysis of data streams, Dis-

535

tributed and Parallel Databases 18 (2) (2005) 173–197. doi:10.1007/

s10619-005-3296-1.

[13] L. Tu, Y. Chen, Stream data clustering based on grid density and attraction, ACM Transactions on Knowledge Discovery from Data (TKDD) 3 (3) (2009) 1–27. doi:10.1145/1552303.1552305.

540

[14] M. PhridviRaj, C. GuruRao, Data mining past, present and future a typical survey on data streams, Procedia Technology 12 (2014) 255–263. doi:10.1016/j.protcy.2013.12.483.

29

Page 29 of 37

[15] Y. Chen, L. Tu, Density-based clustering for real-time stream data, in: 13th ACM SIGKDD international conference on Knowledge discovery and data mining, 2007. doi:10.1145/1281192.1281210.

ip t

545

[16] G. Krempl, M. Spiliopoulou, J. Stefanowski, I. liobaite, D. Brzeziski,

cr

E. Hllermeier, M. Last, V. Lemaire, T. Noack, A. Shaker, S. Sievi, Open challenges for data stream mining research, ACM SIGKDD Explorations

550

us

Newsletter 16 (1) (2014) 1–10. doi:10.1145/2674026.2674028.

[17] A. Bifet, G. de Francisci Morales, J. Read, G. Holmes, B. Pfahringer,

an

Efficient online evaluation of big data stream classifiers, in: 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015, pp. 59–68. doi:10.1145/2783258.2783372.

555

M

[18] L. Golab, M. zsu, Issues in data stream management, ACM SIGMOD Record 32 (2) (2003) 5–14. doi:10.1145/776985.776986.

d

[19] B. Babcock, S. Babu, M. Datar, R. Motwani, J. Widom, Models and issues

te

in data stream systems, in: ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2002, pp. 1–16. doi:10.1145/543614.

Ac ce p

543615. 560

[20] X. Wu, X. Zhu, G. Wu, W. Ding, Data mining with big data, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 26 (1) (2014) 97–107. doi:10.1109/TKDE.2013.109.

[21] B.-K. Yasmine-Derdour, M. Fayal-khelfi, Using mobile data collectors to enhance energy efficiency a nd reliability in delay tolerant wireless sensor

565

networks, Journal of Information Processing Systems 12 (2) (2016) 275– 294.

[22] A. Pughat, V. Sharma, A review on stochastic approach for dynamic power management in wireless sensor networks, Human-centric Computing and Information Sciences 5 (4). doi:10.1186/s13673-015-0021-6.

30

Page 30 of 37

570

[23] I. S. Association, Ieee 802.3 ’standard for ethernet’ marks 30 years of inno-

ip t

vation and global market growth (2013). [24] I. S. for Information Technology, Telecommunications and information exchange between systems - local and metropolitan area networks - specific

575

cr

requirements - part 11: Wireless lan medium access control (mac) and phys-

ical layer (phy) specificatio, ieee std 802.11-2007 (revision ieee std 802.11-

us

1999) (2007).

[25] I. S. for Information technology, Telecommunications and information ex-

an

change between systems–local and metropolitan area networks–specific requirements-part 11: Wireless lan medium access control (mac) and phys580

ical layer (phy) specifications am, ieee std 802.11ad-2012 (amendment to

M

ieee std 802.11-2012, as amend. by ieee std 802.11ae-2012 ieee std 802.11aa2012) (2013).

d

[26] Z.-W. A. R. ZAD12837, Z-wave transceivers - specification of spectrum

585

te

related components (2014).

[27] I. D. S. for Low-Rate Wireless Personal Area Networks (WPANs), Ieee

Ac ce p

p802.15.4-revc/d00(revision ieee std 802.15.4-2011) (2015). [28] C. Gomez, I. Demirkol, Modeling the maximum throughput of bluetooth low energy in an error-prone link, IEEE COMMUNICATIONS LETTERS 15 (11). doi:10.1109/LCOMM.2011.092011.111314.

590

[29] C. Hornig, Rfc 894: Standard for the transmission of ip datagrams over ethernet networks (1984).

[30] J. Melorose, R. Perroy, S. Careas, Rfc 4994: Transmission of ipv6 packets over ieee 802.15.4 networks (2015). [31] J. Nieminen, T. Savolainen, M. Isomaki, Z. Shelby, Ietf draft: Transmission

595

of ipv6 packets over bluetooth low energy (2013).

31

Page 31 of 37

[32] A. Sinha, D. Lobiyal, Performance evaluation of data aggregation for

formation Sciences 3 (13). doi:10.1186/2192-1962-3-13.

ip t

cluster-based wireless sensor network, Human-centric Computing and In-

[33] V. Vujovi, M. Maksimovi, Raspberry pi as internet of things hardware: Performances and constraints, in: International Convention on Informa-

cr

600

tion and Communication Technology, Electronics and Microelectronics

us

(MIPRO), 2014.

[34] A. Technique, Powering iot devices: A novel design and analysis technique,

605

an

Journal of Convergence 7 (2016) 1–18.

[35] N. Kushalnagar, G. Montenegro, C. Schumacher, Rfc 4919: Ipv6 over lowpower wireless personal area networks (6lowpans): overview, assumptions,

M

problem statement, and goals (2007).

[36] S. Deering, Rfc 2460: Internet protocol, version 6 (ipv6) specification

610

d

(1998).

[37] S. Raza, D. Trabalza, T. Voigt, 6lowpan compressed dtls for coap, in: IEEE

te

International Conference on Distributed Computing in Sensor Systems,

Ac ce p

2012, pp. 287–289. doi:10.1109/DCOSS.2012.55. [38] D. Schonberg, K. Ramchandran, S. Pradhan, Distributed code constructions for the entire slepian-wolf rate region for arbitrarily correlated

615

sources, in: Data Compression Conference, 2004. doi:10.1109/DCC.2004. 1281474.

[39] R. Gallager, Low-density parity-check codes, IRE TRANSACTIONS ON INFORMATION THEORY 8 (1962) 21–28.

doi:10.1109/TIT.1962.

1057683.

620

[40] Wikimedia.org, Low-density parity-check code, decoding (2017). [41] D. Puthal, R. Ranjan, J. Chen, Dlsef: A dynamic key-length-based efficient real-time security verification model for big data stream, ACM Transactions on Embedded Computing Systems (TECS) 6 (2). doi:10.1145/2937755. 32

Page 32 of 37

[42] S. Raza, S. Duquennoy, T. Voigt, U. Roedig, Securing communication 625

in 6lowpan with compressed ipsec, in: International Conference on Dis-

ip t

tributed Computing in Sensor Systems, 2011. doi:10.1109/DCOSS.2011. 5982177.

cr

[43] A. Mason, Ipsec overview part two: Modes and transforms (2002).

[44] J. Melorose, R. Perroy, S. Careas, Rfc 6282: Compression format for ipv6 datagrams over ieee 802.15.4 based networks (2015).

us

630

[45] O. Lawlor, Measuring entropy: Information theory, cS 463/480 Lecture

an

(2015).

[46] O. F. Inc., Openssl command, www.openssl.org.

635

M

[47] W. Stallings, Cryptography and network security: principles and practices, pearson Education India (2006).

d

[48] B. Forouzan, D. Mukhopadhyay, Cryptography and network security (sie),

te

mcGraw-Hill Education (2011).

[49] A. Liveris, Z. Xiong, C. Georghiades, Compression of binary sources with

Ac ce p

side information at the decoder using ldpc codes, IEEE Communications 640

Letters 6 (10). doi:10.1109/LCOMM.2002.804244.

[50] G. Caire, S. Shamai, S. Verd, Noiseless data compression with low-density parity-check codes, Advances in Network Information Theory 66 (2004) 263–284.

[51] M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, K. Ramchandran,

645

On compressing encrypted data, IEEE Transactions on Signal Processing 52 (10) (2004) 2992–3006. doi:10.1109/TSP.2004.833860.

[52] P. Kishore, N. Nagendra, K. Reddy, V. Murthy, Smoothing and optimal compression of encrypted gray scale images, International Journal of Engineering Research and Applications (IJERA) 2 (3) (2012) 23–28.

33

Page 33 of 37

650

[53] R. Lazzeretti, M. Barni, Lossless compression of encrypted grey-level and color images, in: European Signal Processing Conference (EUSIPCO),

ip t

2008.

[54] P. Carbone, S. Ewen, S. Haridi, A. Katsifodimos, V. Markl, K. Tzoumas,

655

cr

Apache flink: Unified stream and batch processing in a single engine, in: IEEE International Conference on Data Engineering (ICDE), 2015.

us

[55] M. Jang, H. Lee, K. Schwan, K. Bhardwaj, Soul: An edge-cloud system for mobile applications in a sensor-rich world, in: IEEE/ACM Symposium on

an

Edge Computing, 2016.

[56] D. Wang, T. Abdelzaher, B. Priyantha, J. Liu, F. Zhao, Energy-optimal 660

batching periods for asynchronous multistage data processing on sensor

M

nodes: Foundations and an mplatform case study, in: IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2010.

d

[57] X. Ning, C. Cassandras, Message batching in wireless sensor networksa per-

665

2010.

te

turbation analysis approach, in: IEEE Conference on Decision and Control,

Ac ce p

[58] M. Hell, T. Johansson, W. Meier, Grain: a stream cipher for constrained environments, International Journal of Wireless and Mobile Computing 2 (1) (2007) 86–93.

[59] C. Canniere, B. Preneel, Trivium specifications, eCRYPT Stream Cipher

670

Project (2005).

[60] S. Babbage, M. Dodd, The stream cipher mickey 2.0, eCRYPT Stream Cipher Project (2006).

[61] X. Fan, K. Mandal, G. Gong, Wg-8: A lightweight stream cipher for resource-constrained smart devices, in: International Conference on Het675

erogeneous Networking for Quality, Reliability, Security and Robustness, 2013.

34

Page 34 of 37

[62] Sht75 datasheet, http://legacy.caricoos.org.

low-energy/nRF5-SDK-for-IoT. [64] R.

Neal,

Software

for

low

density

parity

http//radfordneal.github.io/LDPC-Codes (2012).

check

codes,

cr

680

ip t

[63] N. Semiconductor, nrf5 sdk for iot, https://www.nordicsemi.com/eng/Products/Bluetooth-

us

[65] R. Huerta, T. Mosqueiro, J. Fonollosa, N. Rulkov, I. Rodriguez-Lujan, Online decorrelation of humidity and temperature in chemical sensors for continuous monitoring, chemometrics and Intelligent Laboratory Systems (2016).

an

685

[66] K. Kambatla, G. Kollias, V. Kumar, A. Grama, Trends in big data ana-

M

lytics, J. Parallel Distrib. Comput. 74 (2014) 2561–2573. doi:10.1016/j.

Ac ce p

te

d

jpdc.2014.01.003.

35

Page 35 of 37

*Highlights (for review)

Highlights for Reviewers Article entitled: Effective Handling of Secure Data Stream in IoT  In order to improve the usability of encrypted data streams in the IoT environment, a compression method using low-density parity check (LDPC) codes is proposed.

ip t

 This study, which investigates the payload compression of packets instead of the header compression of packets, is applicable even if the payload is encrypted.

Ac ce pt e

d

M

an

us

cr

 As a result of this research, it is expected that the transmission time, as well as the power consumption of IoT devices, can be reduced while securing data streams generated by IoT devices.

Page 36 of 37

*Graphical abstract (for review)

Graphical abstract for Reviewers

ip t

Article entitled: Effective Handling of Secure Data Stream in IoT

 

an

us

cr

Fig. 8. Data flow between IoT device and data stream collector

M

 

Ac ce pt e

d

Fig. 9. Data transmission mechanism in IoT end device

 

Fig. 10. Example of data transmission mechanism in IoT Border Router

  Fig. 11. Example of receiving data in data stream collector

Page 37 of 37