Encryption and hash based security in Internet of Things

The Internet of Things (IoT) promises to be the next big revolution of the World Wide Web. It has a very wide range of applications, ranging from smart cities, smart homes, monitoring radiation levels in nuclear plants, animal tracking, health surveillance and a lot more. When nodes in wireless sensor networks are monitored through internet it becomes a part of Internet of Things. This brings in a lot of concerns related to security, privacy, standardization, power management. This paper aims at enhancing security in smart home systems. Devices like thermostat, air conditioners, doors and lighting systems are connected with each other and the internet through the internet of things technologies. Encryption and hash algorithms are proposed in this paper through which devices in the IoT can securely send messages between them. Encryption algorithm is used to ensure confidentiality as the attackers cannot interpret the cipher text that is sent. In order to ensure integrity (cipher text is not changed) hash algorithm is used.

[1]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[2]  Subhas Chandra Mukhopadhyay,et al.  Towards the Implementation of IoT for Environmental Condition Monitoring in Homes , 2013, IEEE Sensors Journal.

[3]  Cong Wang,et al.  An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[4]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.

[5]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[6]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[7]  N. Senthilkumar,et al.  Integrating Wireless Sensor Networks into InternetOf Things For Security , 2014 .

[8]  Jianbin Zhang,et al.  An IoT-based appliance control system for smart homes , 2013, 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP).

[9]  Cristina Alcaraz,et al.  Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? , 2010, IWSEC 2010.

[10]  Kee-Young Yoo,et al.  Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[11]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[12]  Dong Hoon Lee,et al.  Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[13]  Stefano Tennina,et al.  Performance analysis of a lightweight RSSI-based localization algorithm for Wireless Sensor Networks , 2013, International Symposium on Signals, Circuits and Systems ISSCS2013.

[14]  Donghoon Chang,et al.  RC4-Hash: A New Hash Function Based on RC4 , 2006, INDOCRYPT.

[15]  José Roberto Amazonas,et al.  A Novel Smart Home Application Using an Internet of Things Middleware , 2013 .