Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
Subject Areas : ICTwahab aminiazar 1 , rasoul farahi 2 , fattameh dashti 3
1 -
2 - Islamic Azad University, Mahabad branch, Mahabad, Iran
3 - Islamic Azad University, Mahabad Branch, Tabriz, Iran
Keywords: Internet of things, security, Lightweight Encryption Algorithms, Elliptic Curve Encryption Algorithms.,
Abstract :
In order to use the Internet of Things as a secure infrastructure, there are various challenges and problems, of which security is one of the most important. Establishing security in such networks has many complications due to the limitation of various resources, including processing resources and low energy, and there is a need to establish a kind of compromise between security and available resources. These conditions have caused security to become an important challenge in these networks, and various methods have been presented to improve and optimize this challenge. Accordingly, in this article, a lightweight encryption solution based on symmetric and asymmetric encryption is presented to ensure data security on the Internet of Things. In the proposed method, first, the main data is encrypted by the symmetric Bluefish algorithm, and then its key is secured with the help of the elliptic curve encryption algorithm, so that as a result, data security can be ensured in a short time and with high security in infrastructures based on the Internet of Things provided. In the end, the proposed solution has been evaluated through the Eclipse simulator and by testing on the data volume of 20 to 1000 kilobytes. The simulation results show that the proposed method performs more optimally compared to other encryption algorithms in terms of evaluation criteria such as execution time and encryption and decryption throughput. These results indicate that the proposed solution, while establishing security, has had the least negative impact on the processing resources of IoT nodes.
[1] Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019 Jun 20;7:82721-43.
[2] Ammar M, Russello G, Crispo B. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications. 2018 Feb 1;38:8-27.
[3] Mrabet H, Belguith S, Alhomoud A, Jemai A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors. 2020 Jun 28;20(13):3625.
[4] HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H. A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things. 2021 Jun 1;14:100129. [5] Mousavi SK, Ghaffari A, Besharat S, Afshari H. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks. 2021 Feb;27(2):1515-55.
[6] Fraga-Lamas P, Fernández-Caramés TM, Suárez-Albela M, Castedo L, González-López M. A review on internet of things for defense and public safety. Sensors. 2016 Oct 5;16(10):1644.
[7] Mousavi SK, Ghaffari A, Besharat S, Afshari H. Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems. Journal of Ambient Intelligence and Humanized Computing. 2021 Feb;12(2):2033-51.
[8] D. Wang, W. Li, and P. Wang, “Measuring TwoFactor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks,” IEEE Trans. Ind. Informatics, vol. 14, no. 9, pp. 4081–4092, 2018.
[9] C. M. Chen, S. Liu, X. Li, S. Kumari, and L. Li, “Design and Analysis of a Provable Secure TwoFactor Authentication Protocol for Internet of Things,” Secur. Commun. Networks, vol. 2022.
[10] Xia Z, Liu Y, Hsu CF, Chang CC. Cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications. Security and Communication Networks. 2020 Jul 13;2020:1-8.
[11] El Mouaatamid O, Lahmer M, Belkasmi M. A scalable group authentication scheme based on combinatorial designs with fault tolerance for the Internet of things. SN Computer Science. 2020 Jul;1:1-3.
[12] Yao Y, Chang X, Mišić J, Mišić VB. Lightweight batch AKA scheme for user-centric ultra-dense networks. IEEE Transactions on Cognitive Communications and Networking. 2020 Mar 20;6(2):597-606.
[13] Sun Y, Cao J, Ma M, Zhang Y, Li H, Niu B. EAP-DDBA: efficient anonymity proximity device discovery and batch authentication mechanism for massive D2D communication devices in 3GPP 5G HetNet. IEEE transactions on dependable and secure computing. 2020 Apr 23;19(1):370-87.
[14] Park K, Noh S, Lee H, Das AK, Kim M, Park Y, Wazid M. LAKS-NVT: Provably secure and lightweight authentication and key agreement scheme without verification table in medical internet of things. IEEE Access. 2020 Jun 29;8:119387-404.
[15] Zhu L, Xiang H, Zhang K. A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks. Symmetry 2022, 14, 46. Optimization and Applications of Modern Wireless Networks and Symmetry. 2021:3.
[16] Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems. 2018 May 1;82:727-37.
[17] Shreya S, Chatterjee K, Singh A. A smart secure healthcare monitoring system with Internet of Medical Things. Computers and Electrical Engineering. 2022 Jul 1;101:107969.
[18] Adhikary T, Jana AD, Chakrabarty A, Jana SK. The internet of things (iot) augmentation in healthcare: An application analytics. ICICCT 2019–System Reliability, Quality Control, Safety, Maintenance and Management: Applications to Electrical, Electronics and Computer Science and Engineering. 2020:576-83.
[19] Dhillon PK, Kalra S. Elliptic curve cryptography for real time embedded systems in IoT networks. In2016 5th international conference on wireless networks and embedded systems (WECON) 2016 Oct 14 (pp. 1-6). IEEE.
[20] Durairaj M, Muthuramalingam K. A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. Int. J. Eng. Technol. 2018;7(2.26):119-24.