Abstract
The Internet of Things (IoT) has combined the hardware components with software elements by providing users with remote control and management facilities. From safety-critical systems to security devices and industrial appliances, every appliance makes use of IoTs. Whereas security issues such as SQL injections, Denial of Service/Distributed Denial of Service (DOS/DDOS) attacks, the forged transmission of messages, or man in the middle (MITM) are major security threats among smart devices. Any purging of data causes privacy issues while the subsequent assessments made using modified information are also erroneous. This security hole needs comprehensive non-cryptographic data-security techniques and frameworks which would help developers in creating secure systems on heterogeneous devices. Algorithms like blowfish and Data Encryption Standard (DES) do not have the uniquity which AES does, making them more vulnerable to attack this research paper focuses on the communication security issues in IoT systems. We have proposed an End-to-End Encryption using AES in IoT (EAES-IoT). Validation of the proposed algorithm has been done in a case study of the Smart Voice Pathology Monitoring System (SVPMS) by sending the encoded data to the application layer through Application Programming Interface (API). We compared results to ensure the authenticity of the data and they were found promising. Data access is provided only to authorized individuals by providing a shared key for decryption of the alphanumeric string of data shared between devices. The proposed algorithm will provide future directions to meet security challenges in the IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chze, P.L.R., Leong, K.S.: A secure multi-hop routing for IoT communication. In Proceedings of IEEE World Forum of Internet of Things (WF-IoT), USA, pp. 428–432 (2014)
Hameed, S., Idrees, K.F., Hameed, B.: Understanding security requirements and challenges in Internet of Things (IoT): a review. J. Comput. Netw. Commun. 11, 1–14 (2019)
U-Blox Homepage. https://www.u-blox.com/en/blog/IP-versus-soap-iot-communications. Accessed 18 July 2021
Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)
Zhang, H., Zhang, T.: Short paper: ‘A peer to peer security protocol for the internet of things’: secure communication for the sensible things platform. In 18th International Conference on Intelligence in Next Generation Networks, France, pp. 154–156. IEEE (2015)
Kajwadkar, S., Jain, VK.: A novel algorithm for DoS and DDoS attack detection in Internet of Things. In 2018 Conference on Information and Communication Technology (CICT), India, pp. 1–4. IEEE (2018)
Esquiagola, J., Costa, L., Calcina, P., Zuffo, M.: Enabling CoAP into the swarm: a transparent interception CoAP-HTTP proxy for the Internet of Things. In: 2017 Global Internet of Things Summit (GIoTS), Switzerland, pp. 1–6. IEEE (2017)
Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), India, pp. 859–864. IEEE (2016)
Colitti, W., Steenhaut, K., Caro, N.D.: Integrating wireless senso: networks with the web. In: Extending the Internet to Low Power and Lossy Networks (2011)
Mano, Y., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput. Commun. 89(90), 178–190 (2016)
Miraz, M., Ali, M., Excell, P., Picking, R.: Internet of nano-things, things and everything: future growth trends. Future Internet 10(8), 68 (2018)
Soni, D., Makwana, A.: A survey on MQTT: a protocol of Internet of Things (IoT). In: International Conference on Telecommunication, Power Analysis and Computing Techniques (2017)
Hwang, H.C., Park, J., Shon, J.G.: Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wirel. Pers. Commun. 91(4), 1765–1777 (2016)
Razzak, F.: Spamming the Internet of Things: a possibility and its probable solution. Procedia Comput. Sci. 10, 658–665 (2012)
Alansari, Z., et al.: Internet of Things: infrastructure, architecture, security and privacy. In: 2018 International Conference on Computing, Electronics and Communications Engineering (iCCECE), UK, pp. 150–155. IEEE (2018)
Sundareswaran, V., Mahesh, K., Rajesh, M., Salmon, S.: Survey on smart agriculture using IoT. Int. J. Innov. Res. Eng. Manage. (IJIREM) 5(2), 62–66 (2018)
Tadejko, P.: Application of Internet of Things in logistics-current challenges. Econ. Manag. 7(4), 54–64 (2015)
Hussain, I., Negi, M.C., Pandey, N.: Proposing an encryption/decryption scheme for IoT communications using binary-bit sequence and multistage encryption. In: 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), India, pp. 709–713. IEEE (2018)
Jhosh, A.: Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. Int. Res. J. Eng. Technol. 7(6), 4656–4658 (2020)
Panda, M., Nag, A.: Plain text encryption using AES, DES and SALSA20 by Java based bouncy castle API on Windows and Linux. In: 2015 Second International Conference on Advances in Computing and Communication Engineering, India, pp. 541–548. IEEE (2015)
Dibas, H., Sabri, K.E.: A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In: 2021 International Conference on Information Technology, Jordan, pp. 344–349. IEEE (2021)
Rihan, S.D., Khalid, A., Osman, S.E.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. 4(12), 151–154 (2015)
Muhammad, G., Rahman, S.K.M.M., Alelaiwi, A., Alamri, A.: Smart health solution integrating IoT and cloud: a case study of voice pathology monitoring. IEEE Commun. Mag. 55(1), 69–73 (2017)
Github Homepage. https://github.com/RimshaZahid/IOTEncryption
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zahid, R., Anwar, M.W., Azam, F., Amjad, A., Mukhtar, D. (2022). Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol. In: Lopata, A., Gudonienė, D., Butkienė, R. (eds) Information and Software Technologies. ICIST 2022. Communications in Computer and Information Science, vol 1665. Springer, Cham. https://doi.org/10.1007/978-3-031-16302-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-16302-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16301-2
Online ISBN: 978-3-031-16302-9
eBook Packages: Computer ScienceComputer Science (R0)