Skip to main content

A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography

  • Chapter
  • First Online:
Advanced Computing and Systems for Security

Abstract

Security is one of the primary concerns in an Internet of things (IoT) environment as they are deployed in critical applications that directly affect human lives. For this purpose, a security protocol that involves both authentication of deployed IoT devices and encryption of generated data is proposed in this paper. Encryption algorithms based on chaos are known to satisfy the basic requirements of the cryptosystem such as high sensitivity, high computational speed and high security. The chaos-based encryption algorithm is built upon a modified quadratic map named as quadratic sinusoidal map which exhibits better array of chaotic regime when compared to the traditional logistic map. The authentication protocol, on the other hand, is based on Merkle hash tree that has been improved to adapt to an IoT environment. The control parameters and the initial condition for the map are derived from the Merkle hash tree. The proposed algorithm involves cryptographic operations that incur very low computational cost and requires relatively little storage and at the same time are highly resilient to security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, B., Zhang, D., Yu, Z., Liang, Y., Wang, Z., Zhou, X.: From the internet of things to embedded intelligence. World Wide Web 16(4), 399–420 (2013)

    Article  Google Scholar 

  2. Lampropoulos, K., Denazis, S.: Identity management directions in future internet. IEEE Commun. Mag. 49(12), 74–83 (2011)

    Article  Google Scholar 

  3. Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  MathSciNet  Google Scholar 

  4. Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: Mur-dpa: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2015)

    Article  MathSciNet  Google Scholar 

  5. Xu, K., Ma, X., Liu, C.: A hash tree based authentication scheme in sip applications. In: IEEE International Conference on Communications, ICC’08. IEEE (2008), pp. 1510–1514 (2008)

    Google Scholar 

  6. Niaz, M.S., Saake, G.: Merkle hash tree based techniques for data integrity of outsourced data.’ In: GvD, pp. 66–71 (2015)

    Google Scholar 

  7. Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, Y., Wu, J., Wu, W., Chilamkurti, N., Jeon, G.: An encryption algorithm based on combined chaos in body area networks (2017). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0045790617324138

  8. Wang, X.-Y., Zhang, Y.-Q., Bao, X.-M.: A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6), 3877–3897 (2015)

    Article  Google Scholar 

  9. Akhshani, A., Akhavan, A., Mobaraki, A., Lim, S.-C., Hassan, Z.: Pseudo random number generator based on quantum chaotic map. Commun. Nonlinear Sci. Numer. Simul. 19(1), 101–111 (2014)

    Article  Google Scholar 

  10. Avaroğlu, E.: Pseudorandom number generator based on arnold cat map and statistical analysis. Turk. J. Electr. Eng. Comput. Sci. 25(1), 633–643 (2017)

    Article  Google Scholar 

  11. Moreira, F.J.S.: Chaotic dynamics of quadratic maps. IMPA (1993)

    Google Scholar 

  12. Abundiz-Pérez, F., Cruz-Hernández, C., Murillo-Escobar, M., López-Gutiérrez, R., Arellano-Delgado, A.: A fingerprint image encryption scheme based on hyperchaotic rössler map. Math. Probl. Eng. 2016 (2016)

    Google Scholar 

  13. Murillo-Escobar, M., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.M.: Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 45, 297–309 (2016)

    Article  Google Scholar 

  14. Méndez-Ramírez, R., Arellano-Delgado, A., Cruz-Hernández, C., Abundiz-Pérez, F., Martínez-Clark, R.: Chaotic digital cryptosystem using serial peripheral interface protocol and its dspic implementation. Front. Inf. Technol. Electron. Eng. 19(2), 165–179 (2018)

    Article  Google Scholar 

  15. Hassan, W.H., et al.: Current research on internet of things (iot) security: a survey. Comput. Netw. 148, 283–294 (2018)

    Google Scholar 

  16. Hou, J., Qu, L., Shi, W.: A survey on internet of things security from data perspectives. Comput. Netw. 148, 295–306 (2018)

    Article  Google Scholar 

  17. Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens J 13(10), 3693–3701 (2013)

    Article  Google Scholar 

  18. Ning, H., Liu, H., Yang, L.: Cyber-entity security in the internet of things. Computer p. 1 (2013)

    Google Scholar 

  19. Cai, X., Wang, Y., Zhang, X., Luo, L.: Design and implementation of a wifi sensor device management system. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp. 10–14 (2014)

    Google Scholar 

  20. Gope, P., Hwang, T., et al.: Untraceable sensor movement in distributed iot infrastructure. IEEE Sens. J. 15(9), 5340–5348 (2015)

    Article  Google Scholar 

  21. Gope, P., Hwang, T.: Bsn-care: A secure iot-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)

    Article  Google Scholar 

  22. Loi, F., Sivanathan, A., Gharakheili, H.H., Radford, A., Sivaraman, V.: Systematically evaluating security and privacy for consumer iot devices. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM, pp. 1–6 (2017)

    Google Scholar 

  23. Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W.: Blockchain’s adoption in iot: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251–279 (2019). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804518303473

  24. Mookherji, S., Sankaranarayanan, S.: Traffic data classification for security in iot-based road signaling system. In: Soft Computing in Data Analytics, pp. 589–599. Springer, Berlin (2019)

    Google Scholar 

  25. Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F., Baldini, G.: Risk-based automated assessment and testing for the cybersecurity certification and labelling of iot devices. Comput. Stand. Interfaces 62, 64–83 (2019)

    Article  Google Scholar 

  26. Merkle, R.C.: A certified digital signature. In: Conference on the Theory and Application of Cryptology, pp. 218–238. Springer (1989)

    Google Scholar 

  27. Li, H., Lu, R., Zhou, L., Yang, B., Shen, X.: An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8(2), 655–663 (2014)

    Article  Google Scholar 

  28. Lawande, Q., Ivan, B., Dhodapkar, S.: Chaos based cryptography: a new approach to secure communications. BARC newsletter, vol. 258, no. 258 (2005)

    Google Scholar 

Download references

Acknowledgements

This work is partly supported by the Ministry of Electronics & Information Technology (MeitY), Government of India, under the Visvesvaraya PhD Scheme for Electronics & IT (PhD-PLA/4(71)/2015-16) and DST-Water Technology Initiative (WTI) (DST/TM/WTI/2k16/45(C)) dated 28 September 2016, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nashreen Nesa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nesa, N., Banerjee, I. (2020). A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 996. Springer, Singapore. https://doi.org/10.1007/978-981-13-8969-6_1

Download citation

Publish with us

Policies and ethics