Hybrid Algorithm for Data Confidentiality in Internet of Things

Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us this interconnection produce large amount of private information which needs to be processed, transferred and stored. So to provide security and privacy to this information in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices are guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. In this paper, we propose hybrid confidentiality algorithm which is a combination of Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC) and Message-Digest algorithm (MD5) algorithms. Geo encryption or location based encryption is also integrated with hybrid algorithm to give confidentiality to every devices. The hybrid algorithm enables strong confidentiality on the data transmission for Internet of things. Our proposed algorithm exhibits better performance in terms of encryption time, decryption time w.r.t. various file sizes.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Wang Chen An IBE-based security scheme on Internet of Things , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[3]  Michael J. Covington,et al.  Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[4]  Yousof Al-Hammadi,et al.  Secure lightweight ECC-based protocol for multi-agent IoT systems , 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[5]  Harsh Durga Tiwari,et al.  Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices , 2018, ETRI Journal.

[6]  Behnam Dezfouli,et al.  Analyzing the Resource Utilization of AES Encryption on IoT Devices , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[7]  M.S. Kakkasageri,et al.  Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach , 2009, 2009 International Conference on Future Computer and Communication.

[8]  Xiao Feng Wang,et al.  Research on Security Issues of the Internet of Things , 2014, CIT 2014.

[9]  Joakim Eriksson,et al.  BSD-based elliptic curve cryptography for the open Internet of Things , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).

[10]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[11]  Kun-Lin Tsai,et al.  AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.

[12]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[14]  Y Chandu,et al.  Design and implementation of hybrid encryption for security of IOT data , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[15]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .

[16]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[17]  Guanyu Li,et al.  Descriptive models for Internet of Things , 2010, 2010 International Conference on Intelligent Control and Information Processing.

[18]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[19]  Mohammad Kalantari,et al.  Enhancing security and confidentiality in location-based data encryption algorithms , 2011 .