76,910 research outputs found

    Energy saving chaotic sequence based encryption, authentication and hashing for M2M communication of IoT device

    Get PDF
    In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energy-efficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices

    Privacy-aware secured discrete framework in wireless sensor network

    Get PDF
    Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol

    A Secure Data Transmission Scheme in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) play a very important role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifetime of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for pre-calculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs

    Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework

    Get PDF
    The Internet of Things (IoT) devices have the capabilities to interact and communicate in 5G heterogeneous networks. They also have the capabilities to form a network with neighborhood devices without a centralized approach. This network is called the mobile ad hoc network (MANET). Through an infrastructure-less system of the Internet of Things environment, the MANET enables IoT nodes to interact with one another. Those IoT nodes could interactively connect, communicate as well as share knowledge between several nodes. The role of cloud throughout this structure is to store as well as interpret information through IoT nodes. The communication security has been introduced as one of the techniques to solve the data transmission security issue that could result in increased performance in cloud consumption and ubiquity. The purpose of this research is to establish a communication system among IoT nodes in an embedded Cloud and MANET structure. Aiming to create an efficient and secure approach for communication in Cloud-MANET-IoT integrated framework, this approach has been implemented and tested

    Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices

    Get PDF
    In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices

    LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM

    Get PDF
    The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications. However, generating and transmitting huge amount of data in the IoT makes it crucial to implement a secure and safe data transmission scheme. Cryptography methods can secure the confidentiality, data integrity, access control, and authentication. Due to constrained resources in IoT devices, providing classical cryptography schemes isn’t efficient for IoT applications, so a lightweight cryptography scheme is one of the most important solutions to overcome security challenges in IoT. In this paper, a new security scheme called ECCCSASHA256 based on Elliptic Curve Cryptography (ECC) and Secure Hash Algorithm (SHA-256) using Crow Search Algorithm (CSA) has been proposed for secure data transmission in IoT devices. The ECCCSASHA256 model uses the CSA for generating a private key to encode the elliptic curve. Furthermore, the proposed scheme uses SHA-256 model for hashing the incoming encoded data using ECC. The simulation results indicate that the average throughput of the proposed model was about 8.22% and 8.97% higher in encryption and 8.72% and 9.81% higher in decryption compared to 3DES&ECC&SHA-256 and RC4&ECC&SHA-256, respectively

    Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption

    Full text link
    [EN] This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image encryption. First, an efficient video summarization method is used to extract the informative frames using the processing capabilities of visual sensors. When an event is detected from keyframes, an alert is sent to the concerned authority autonomously. As the final decision about an event mainly depends on the extracted keyframes, their modification during transmission by attackers can result in severe losses. To tackle this issue, we propose a fast probabilistic and lightweight algorithm for the encryption of keyframes prior to transmission, considering the memory and processing requirements of constrained devices that increase its suitability for IoT systems. Our experimental results verify the effectiveness of the proposed method in terms of robustness, execution time, and security compared to other image encryption algorithms. Furthermore, our framework can reduce the bandwidth, storage, transmission cost, and the time required for analysts to browse large volumes of surveillance data and make decisions about abnormal events, such as suspicious activity detection and fire detection in surveillance applications.This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2016R1A2B4011712). Paper no. TII-17-2066.Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.; Baik, SW. (2018). Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Transactions on Industrial Informatics. 14(8):3679-3689. https://doi.org/10.1109/TII.2018.2791944S3679368914

    Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks

    Get PDF
    Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network
    • …
    corecore