{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:50:31Z","timestamp":1760241031187,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"22","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006108","name":"Kult\u00farna a Edukacn\u00e1 Grantov\u00e1 Agent\u00fara M\u0160VVa\u0160 SR","doi-asserted-by":"publisher","award":["011STU-4\/2017"],"award-info":[{"award-number":["011STU-4\/2017"]}],"id":[{"id":"10.13039\/501100006108","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003193","name":"Ministerstvo \u0161kolstva, vedy, v\u00fdskumu a \u0161portu Slovenskej republiky","doi-asserted-by":"publisher","award":["ITMS 26240220084","2018\/14427:1-26C0","002STU-2-1\/2018"],"award-info":[{"award-number":["ITMS 26240220084","2018\/14427:1-26C0","002STU-2-1\/2018"]}],"id":[{"id":"10.13039\/501100003193","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The rapidly growing segment of the Internet of Things (IoT) makes the security threats more prominent than ever. The research around communication security and cybersecurity in such networks is still a challenge, mainly due to the typically limited energy and computation resources of IoT devices. The strong security mechanisms require significant power and thus the energy wastage must be minimized. Optimized application-specific security protocols are commonly used to make the data transfer more efficient, while still offering a high level of security. The supported security features, such as confidentiality, integrity or authenticity, should not be affected by the optimization. Our work is focused on optimizing one of the existing security protocols for the use in the IoT area, namely the Host Identity Protocol (HIP). Based on the analysis of related works, we have identified multiple possibilities for optimization and combined some of them into the proposed E-HIP optimized protocol. For verification purpose, it has been implemented as a modification of the open-source OpenHIP library and applied on a communication between real hardware devices. The secured communication worked correctly. The resulting effect of the proposed optimization has been evaluated experimentally and it represents an increase in energy efficiency by about 20%. Compared to other HIP optimizations, the achieved results are similar; however, the proposed optimizations are unique and can be further combined with some of the existing ones to achieve even higher efficiency.<\/jats:p>","DOI":"10.3390\/s19224921","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T09:11:27Z","timestamp":1573636287000},"page":"4921","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks"],"prefix":"10.3390","volume":"19","author":[{"given":"Peter","family":"Ka\u0148uch","sequence":"first","affiliation":[{"name":"Faculty of Informatics and Information Technologies, Slovak University of Technology in Bratislava, Ilkovi\u010dova 2, 842 16 Bratislava, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8235-2004","authenticated-orcid":false,"given":"Dominik","family":"Macko","sequence":"additional","affiliation":[{"name":"Faculty of Informatics and Information Technologies, Slovak University of Technology in Bratislava, Ilkovi\u010dova 2, 842 16 Bratislava, Slovakia"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,12]]},"reference":[{"key":"ref_1","first-page":"34","article-title":"Vision and challenges for realising the Internet of Things","volume":"3","author":"Sundmaeker","year":"2010","journal-title":"Clust. Eur. Res. Proj. Internet Things Eur. Comm."},{"key":"ref_2","unstructured":"Bartje, J. (2019, June 18). The top 10 IoT Application Areas\u2014Based on Real IoT Projects. Available online: https:\/\/iot-analytics.com\/top-10-iot-project-application-areas-q3-2016\/."},{"key":"ref_3","unstructured":"Davis, D.B. (2019, June 18). ISTR 2019: Internet of Things Cyber Attacks Grow More Diverse. Available online: https:\/\/www.symantec.com\/blogs\/expert-perspectives\/istr-2019-internet-things-cyber-attacks-grow-more-diverse."},{"key":"ref_4","unstructured":"Gatlan, S. (2019, June 18). IoT Attacks Escalating with a 217.5% Increase in Volume. Available online: https:\/\/www.bleepingcomputer.com\/news\/security\/iot-attacks-escalating-with-a-2175-percent-increase-in-volume."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N., and Urien, P. (2015, January 9\u201311). Internet of Things: A definition & taxonomy. Proceedings of the IEEE 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, UK.","DOI":"10.1109\/NGMAST.2015.71"},{"key":"ref_6","unstructured":"El Mouaatamid, O., Lahmer, M., and Belkasmi, M. (2016). Internet of Things Security: Layered Classification of Attacks and Possible Countermeasures. Electron. J. Inf. Technol., 24\u201337."},{"key":"ref_7","unstructured":"Morgan, J. (2019, June 18). A simple explanation of \u2018The Internet of Things\u2019. Available online: https:\/\/www.forbes.com\/sites\/jacobmorgan\/2014\/05\/13\/simple-explanation-internet-things-that-anyone-can-understand\/#1c6e34f61d09."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.comnet.2017.08.006","article-title":"Energy-efficient mechanisms in security of the internet of things: A survey","volume":"127","author":"Hellaoui","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Banerjee, U., Juvekar, C., Fuller, S.H., and Chandrakasan, A.P. (2017, January 4\u20138). eeDTLS: Energy-Efficient Datagram Transport Layer Security for the Internet of Things. Proceedings of the GLOBECOM 2017\u2014IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8255053"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","article-title":"Lithe: Lightweight secure CoAP for the Internet of Things","volume":"13","author":"Raza","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.compeleceng.2017.06.032","article-title":"Lightweight key agreement protocol for IoT based on IKEv2","volume":"64","author":"Lavanya","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Urien, P. (2015). Innovative TLS\/DTLS Security Modules for IoT Applications: Concepts and Experiments. International Internet of Things Summit, Springer.","DOI":"10.1007\/978-3-319-47063-4_1"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., and Rossi, M. (2012, January 25\u201328). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. Proceedings of the 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA.","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Heer, T., Jokela, P., and Henderson, T. (2015). Host Identity Protocol Version 2 (HIPv2). IETF, RFC 7401, Internet Engineering Task Force (IETF). Technical Report.","DOI":"10.17487\/rfc7401"},{"key":"ref_15","unstructured":"Saied, Y.B., and Olivereau, A. (April, January 29). HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things. Proceedings of the IEEE Third International Conference on Communications and Networking, Hammamet, Tunisia."},{"key":"ref_16","unstructured":"Moskowitz, R., Hummen, R., and Komu, M. (2019, August 07). Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-hip-dex-08."},{"key":"ref_17","unstructured":"Heer, T.M. (2006). LHIP\u2013Lightweight Authentication for the Host Identity Protocol. [Master\u2019s Thesis, University of T\u00fcbingen]."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ponomarev, O., Khurri, A., and Gurtov, A. (2010, January 11\u201316). Elliptic curve cryptography (ECC) for Host Identity Protocol (HIP). Proceedings of the IEEE 2010 Ninth International Conference on Networks, Menuires, France.","DOI":"10.1109\/ICN.2010.68"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hummen, R., Hiller, J., Henze, M., and Wehrle, K. (2013, January 7\u20139). Slimfit-A HIP DEX compression layer for the IP-based Internet of Things. Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673370"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.comnet.2015.08.002","article-title":"Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things","volume":"91","author":"Sahraoui","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s11277-017-4176-5","article-title":"CHIP: Collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things","volume":"96","author":"Porambage","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ka\u0148uch, P., and Macko, D. (2019, January 1\u20133). Optimizing energy efficiency of secured IoT communication by OpenHip. Proceedings of the IEEE 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary.","DOI":"10.1109\/TSP.2019.8769096"},{"key":"ref_23","unstructured":"(2018, September 20). OpenHIP: Host Identity Protocol implementation. Available online: https:\/\/bitbucket.org\/openhip\/openhip."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bokor, L., Nov\u00e1czki, S., Zeke, L.T., and Jeney, G. (2009). Design and Evaluation of Host Identity Protocol (HIP) Simulation Framework for INET\/OMNeT++. Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM.","DOI":"10.1145\/1641804.1641827"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Boyd, C., and Gonz\u00e1lez Nieto, J.M. (2005). Analysis of the HIP base exchange protocol. Information Security and Privacy, Springer.","DOI":"10.1007\/b137750"},{"key":"ref_26","first-page":"1","article-title":"Recommendation for Key Management Part 1: General (Revision 4)","volume":"800","author":"Barker","year":"2016","journal-title":"NIST Spec. Pub."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/SURV.2010.021110.00070","article-title":"Host Identity Protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks","volume":"12","author":"Nikander","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","unstructured":"Abid, N., and Laurent, M. (2019, November 12). Available online: https:\/\/hal.archives-ouvertes.fr\/hal-01360031."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/22\/4921\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:33:46Z","timestamp":1760189626000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/22\/4921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":28,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2019,11]]}},"alternative-id":["s19224921"],"URL":"https:\/\/doi.org\/10.3390\/s19224921","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,11,12]]}}}