A New Hybrid Cryptosystem for Internet of Things Applications

The Internet of Things or ‘‘IoT’’ defines a highly interconnected network of heterogeneous devices where all kinds of communications seem to be possible. As a result, the security requirement for such network becomes critical whilst these devices are connected. Today, all commercial applications will be performed via Internet; even the office environment is now extending to employ’s home. This chapter presents a new proposed cyber security scheme for IoT to facilitate additional level of security through the involvement of a new level of key-hierarchy. In this chapter, we present the closed system environment, the proposed scheme, the services provided, the exchange of message format, and the employed four level key-hierarchies. We use application level security for selectively securing information to conserve power and increase computational speed which is useful for IoT and wireless applications. The analysis of the proposed scheme is discussed based on the strength of symmetric algorithms such as RSA and AES algorithms.

[1]  Asoke Nath,et al.  Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm , 2011, 2011 World Congress on Information and Communication Technologies.

[2]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[3]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[4]  Chris Hare,et al.  Internet Security Professional Reference, Second Edition , 1998 .

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[7]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[8]  Carl M. Ellison,et al.  The nature of a useable PKI , 1999, Comput. Networks.

[9]  Sitesh Kumar Sinha,et al.  A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network , 2013 .

[10]  Eduardo Jacob,et al.  Cyber-security in substation automation systems , 2016 .

[11]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[12]  Joonsang Baek,et al.  Compact identity-based encryption without strong symmetric cipher , 2011, ASIACCS '11.

[13]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[14]  CORPORATE NIST The digital signature standard , 1992, CACM.

[15]  Denise Demirel,et al.  An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme , 2015, IACR Cryptol. ePrint Arch..

[16]  Ralf Küsters,et al.  Computational soundness for key exchange protocols with symmetric encryption , 2009, CCS.

[17]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[18]  Antoine Joux,et al.  Differential Collisions in SHA-0 , 1998, CRYPTO.

[19]  Saudi Arabia,et al.  SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption , 2015, ICIT 2015.

[20]  Chris Hare,et al.  Internet Security: Professional Reference , 1996 .

[21]  Bibhudendra Acharya,et al.  Image encryption using index based chaotic sequence, M sequence and gold sequence , 2011, ICCCS '11.