Total views : 424

Design of Secured and Intelligent Architecture for Security in Perceptual Layer of the Internet of Things

Affiliations

  • Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry,, India
  • Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry, India

Abstract


Background: Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. As the technologies are developing huge amount of information are exchanged with each other which increases the demand of a secure encryption standards. Objectives: To protect the information transmission between nodes in the perceptual layer of IoT, security is to be enhanced such that the Men in Middle (MIM) attack of information by intruders in the communication link is not possible. Methods/Statistical analysis: The security method is implemented using the concept of symmetric, asymmetric and hash algorithms between the sender and receiver. Elliptic Curve Cryptography (ECC) is performed for encrypting and sharing the Advanced Encryption Standard (AES) secret key between the sender and receiver. Elliptic Curve digital signature are added with the encrypted data for validation in transmission. Secured Hash Algorithm (SHA) is considered for generating Elliptical Curve Digital Signature Algorithm (ECDSA). All the algorithms are combined to enhance the security. Findings: Elliptic Curve Cryptography is generally applied for encrypting and sharing the secret key between the sender and receiver when Advanced Encryption Standard is used for encryption/decryption of data. A highly efficient architectures for asymmetric key encryption is applied with symmetric key encryption for encrypting the data transmitted between the devices present in the perceptual layers in the IoT. Due to security issues NIST selected SHA-3 Keccak-f[1600] algorithm. An authentication process based on ECC is applied to perceptual layer involving initialization and authentication phase apart from encryption and signature generation. Sender combines the encrypted data and key with signature together before transmitting to the receiver. The receiver verifies the signature and decrypts the key and obtains original information. Hence it is very difficult for the man in middle to access the information exchanged between the Perceptual Layer devices. Application/Improvements: This generally doesn’t require an innovative technique but an approach to develop the method implemented successfully in the perceptual layer of Internet of Things. The key is encrypted and decrypted using a novel ECC algorithm with improved ECDSA.

Keywords

Elliptical Curve Cryptography (ECC), Elliptic Curve Digital Signature Algorithm (EDSA), Internet of Things (IoT), Keccak, Perception Layer, Secured Hash Algorithm (SHA).

Full Text:

 |  (PDF views: 268)

References


  • Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Generation Computer Systems. 2013; (29):1645–60.
  • Vermesan O, Friess P. Internet of Things from Research and Innovation to Market Deployment. River Publishers Series in Communications. 2014. p. 8–15.
  • Aggarwal M, Singh M. Smart city based on NDNoT: The future of IoT. Indian Journal of Science and Technology. 2016 Sep; 9(36):1–8. Doi: 10.17485/ijst/2016/ v9i36/89557.
  • Bormann C, Ersue M, Keranen A. Terminology for Constrained-Node Networks. RFC 7228 (Informational), C. Internet Engineering Task Force, May 2014. [Online].Available from: http://www.ietf.org/rfc/rfc7228.txt
  • Nithya S, George E, Raj P. Survey on Asymmetric key Cryptography Algorithms. Journal of Advanced Computing Technologies. 2014; 2(1).
  • Rajam STR, Kumar SBR. Enhanced elliptic curve cryptography. Indian Journal of Science and Technology. 2015 Oct; 8(26):1–6. Doi: 10.17485/ijst/2015/v8i26/80444.
  • Diffie W, Hellman M. New Directions in Cryptography. IEEE Transactions on Information Theory. 1976; (22):644–54.
  • AES, Available from: http://www.nist.gov/CryptoToolkit 9. Daemen J, Rijmen V. AES Proposal: Rijndael, AES Algorithm. Submission 1999, available at ‘8’.
  • Agrawal H, Sharma M. Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology. 2010 Dec; 3(12):1173–6.
  • Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography, CRC Press, New York. 1997; 81–3.
  • Amruta R, Dumane N, Narole G, Wanjari P. Design of advanced encryption standard on soft-core processor. World Conference on Futuristic Trends in Research and Innovation for Social Welfare. 2016. p. 1–5.
  • Pendli V, Pathuri M, Yandrathi S, Razaque A. Improvising performance of Advanced Encryption Standard algorithm. Proceedings of Second International Conference on Mobile and Secure Services (MobiSecServ). 2016. p. 1–5.
  • Garcia DF. Performance Evaluation of Advanced Encryptio n Standard Algorithm. Proceedings of Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI). 2015. p. 247–52.
  • Joshi A, Dakhole PK, Thatere A. Implementation of S-Box for Advanced Encryption Standard. Proceedings of IEEE International Conference on Engineering and Technology (ICETECH). 2015. p. 1–5.
  • Miller VS. Use of elliptic curves in cryptography. Advanced in Cryptology, Proceedings of Crypto85, Lecture note in Computer Science, Springer Verlag. 1986; 417–26.
  • Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation. 1987; (48):203–9.
  • Shau PK, Chhotray RK, Jena G, Pattnaik S. An Implementation of Elliptic Curve Cryptography. International Journal of Engineering Research and Technology. 2013; 2(1).
  • Menezes A, Vanstone S. Elliptic curve cryptosystem and their implementation. Journal of Cryptography. 1993; 6(4):209–24.
  • EI Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. Advanced in Cryptology. Proceedings of Crypto84. Springer Verlag. 1988; 10–8.
  • ELGamal T. A public cryptosystem and signature scheme based on discrete logarithms. IEEE Trans on Info Theory(S0018-9448). 1985; 31(4):469–72.
  • Rivest RL, Shamir A, Adleman LM. Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM. 1978; 21:120–6.
  • Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory. 1976; 22:644–54.
  • Nagaraj S, Raju GSVP. Image security using ECC approach. Indian Journal of Science and Technology. 2015 Oct; 8(26):1–5. Doi: 10.17485/ijst/2015/v8i26/81185.
  • Kurt M, Yerlikaya T. A New Modified Cryptosystem Based on Menezes Vanstone Elliptic Curve Cryptography Algorithm that Uses Characters’ Hexadecimal Values. TAEECE, Turkey. 2013.
  • Kurt M, Duru N. Encryption with Changing Least Significant Bit on Menezes Vanstone Elliptic Curve Cryptosystem. 2014; 1–3.
  • Geetha G, Jain P. Implementation of Matrix based Mapping Method using Elliptic Curve Cryptography. International Journal of Computer Applications Technology and Research. 2014; 3(5):312–17.
  • Amounas F, El Kinani EH. Cryptography with elliptic curve using Tifinagh characters. Journal of Mathematics and System Science. 2012; 139–44.
  • Amounas F, El Kinani EH. An Efficient Elliptic Curve Cryptography protocol Based on Matrices. International Journal of Engineering Inventions. 2012; 1(9):49–54.
  • Pan W, Zheng F, Zhao Y. An Efficient Elliptic Curve Cry ptography Signature Server with GPU Acceleration. IEEE Transactions on Information Forensics and Security. 2017; 111–22.
  • Reddy AG, Das AK, Yoon E-J, Yoo K-Y. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access. 2016; 4:4394–407.
  • Available from: http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf
  • Stallings W. Cryptography and Network Security, principles and practices, 4th Edition.
  • Computer Security Objects Register (CSOR). Available from: http://csrc.nist.gov/csor/
  • Yalcin T. Compact ECDSA engine for IoT applications. IET Electronics Letters. 2016; 52(16).
  • El hadjyoussefwajih, Mohsen M, Rached T. A Secure Elliptic Curve Digital Signature Scheme for Embedded Device. International Conference on Signals, Circuits and Systems. 2008. p. 1–6.
  • Knezevic M, Nikov V, Rombouts P. Low-Latency ECDSA Signature Verification-A Road Toward Safer Traffic. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2016; 24(11):3257–67.
  • Zhang Q, Li Z, Song C. The Improvement of digital signature algorithm based on elliptic curve cryptography. 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC).2011. p. 1689–91.
  • Junru H. The improved elliptic curve digital signature algorithm. International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT). 2011. p. 257–9.
  • Lamba S, Sharma M. An Efficient Elliptic Curve Digital Si gnature Algorithm (ECDSA).International Conference on Machine Intelligence and Research Advancement. 2013.p. 179–83.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.