Skip to main content
Log in

An Efficient and Secure Communication Mechanism for Internet of Things Based Connected Devices

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The modern world is rapidly changing towards a novel era of technology, where not only human beings but devices are also being connected to each other with the inherent ability of communication advancements. With the evolution of social media and Internet-based applications, a large amount of information flows through communication channels and discloses numerous vulnerabilities. Cisco Inc. forecasted that approximately 50 billion devices will be linked through the Internet by 2021 termed as the Internet of Things (IoT) across the world. Typically, IoT devices are designed to collect and share sensitive information which opens a new kind of challenge in the area of security and privacy. These devices are inefficient to perform present security-based algorithms such as RSA due to the limited number of resources associated with it. This paper presents an RSA algorithm based Efficient Improved Digital Signature Algorithm (RSAEDSA) for the IoT environment. The proposed algorithm is designed to provide a secure and efficient communication mechanism for IoT-connected devices. Meanwhile, it also addresses the limitations of traditional RSA algorithms in terms of resource usage, parameter optimization, etc. The analysis of the proposed RSAEDSA algorithm shows its effectiveness which highlights the improvements in the security measures and quality of service (QoS) in the IoT environment. The simulated results show the performance superiority of RSAEDSA over the traditional methods with respect to the QoS parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of Data and Material

The data and materials that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Kozma, D., Varga, P., & Larrinaga, F. (2019). Data-driven Workflow Management by utilising BPMN and CPN in IIoT Systems with the Arrowhead Framework, in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Sep. 2019, vol. 2019-Septe, pp. 385–392, https://doi.org/10.1109/ETFA.2019.8869501.

  2. Sengupta, J., Ruj, S., & Das Bit, S. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481. https://doi.org/10.1016/j.jnca.2019.102481. Academic Press.

    Article  Google Scholar 

  3. Tanwar, S., Vora, J., Tyagi, S., Kumar, N., & Obaidat, M. S. (2018). A systematic review on security issues in vehicular ad hoc network. Security and Privacy, 1(5), 39. https://doi.org/10.1002/spy2.39

    Article  Google Scholar 

  4. Yinbiao, S., et al. (2014) Internet of things: Wireless sensor networks, International Electronic Commision, no. December, pp. 1–78.

  5. Lu, C. (2014). Overview of security and privacy issues in the internet of things, pp. 1–11.

  6. Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review, in Proceedings of 2012 International Conference on Computer Science and Electronic Engineering ICCSEE 2012, vol. 3, pp. 648–651. https://doi.org/10.1109/ICCSEE.2012.373.

  7. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134. https://doi.org/10.1016/j.jnca.2014.01.014

    Article  Google Scholar 

  8. Singh, J., & Singh, K. (2018). Congestion control in vehicular ad hoc network: A review. Advances in Intelligent Systems and Computing, 638, 489–496. https://doi.org/10.1007/978-981-10-6005-2_49

    Article  Google Scholar 

  9. Srivastava, S., et al. (2021). Event-driven data alteration detection using block-chain. Security and Privacy, 4(2), e146.

    Article  Google Scholar 

  10. Neeraja, Y., & Sumalatha, V. (2019). Priority based QoS-aware medium access control protocol for mobile Ad-Hoc networks, in Intelligent Systems Reference Library, vol. 172, Springer, 2019, pp. 145–153.

  11. Sabri, Y., El Kamoun, N., & Lakrami, F. (2019). Investigation of energy efficient routing protocols in wireless sensor networks on variant energy models, in ACM International Conference Proceeding Series, pp. 1–5, https://doi.org/10.1145/3372938.3372989.

  12. Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and cooperative routing protocol for IoT security. Journal of Information Security and Application, 52, 102467. https://doi.org/10.1016/j.jisa.2020.102467

    Article  Google Scholar 

  13. Faisal, M., Abbas, S., & Ur Rahman, H. (2018). Identity attack detection system for 80211-based ad hoc networks. Eurasip Journal on Wireless Communication and Networking, 1, 1–16. https://doi.org/10.1186/s13638-018-1143-0

    Article  Google Scholar 

  14. Chahal, R. K., Kumar, N., & Batra, S. (2020). Trust management in social internet of things: A taxonomy, open issues, and challenges. Computer Communications, 150, 13–46. https://doi.org/10.1016/j.comcom.2019.10.034. Elsevier B.V.

    Article  Google Scholar 

  15. Zhu, Y., Guo, R., Gan, G., & Tsai, W.-T. (2016). Interactive incontestable signature for transactions confirmation in bitcoin blockchain, in 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016, vol. 1, pp. 443–448.

  16. Tian, H. B., He, J. J., & Fu, L. Q. (2017). A privacy preserving fair contract signing protocol based on public block chains. Journal of Cryptologic Research, 4(2), 187–198.

    Google Scholar 

  17. Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36–63.

    Article  Google Scholar 

  18. Eke, C.I., Azah, A.N., & Mwenge, M. (2023). Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review. Artificial Intelligence Review 1–44.

  19. Mahmood, S., Gohar, M., Choi, J.-G., Koh, S.-J., Alquhayz, H., & Khan, M. (2021). Digital certificate verification scheme for smart grid using fog computing (FONICA). Sustainability, 13(5), 2549.

    Article  Google Scholar 

  20. Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks, in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, 2000, pp. 255–265, https://doi.org/10.1145/345910.345955.

  21. Dhanya, K., Jeyalakshmi, C., Balakumar, A. (2020). An acknowledgment-based approach for implementing trusted routing protocol in MANET, in Lecture Notes in Networks and Systems, vol. 89, Springer, pp. 1089–1096.

  22. Buttyán, L., & Hubaux, J.P. (2000). Enforcing service availability in mobile ad-hoc WANs, in 2000 1st Annual Workshop on Mobile and Ad Hoc Networking and Computing, MobiHOC 2000, 2000, pp. 87–96, https://doi.org/10.1109/MOBHOC.2000.869216

  23. Ghaffari, A. (2020). Hybrid opportunistic and position-based routing protocol in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1593–1603. https://doi.org/10.1007/s12652-019-01316-z

    Article  Google Scholar 

  24. Alotaibi, M. (2019). Security to wireless sensor networks against malicious attacks using Hamming residue method. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–7. https://doi.org/10.1186/s13638-018-1337-5

    Article  Google Scholar 

  25. Easttom, W. (2021). Modern Cryptography. Springer International Publishing.

    Book  MATH  Google Scholar 

  26. Srivastava, S., Kumar, A., Jha, S. K., Dixit, P., & Prakash, S. (2021). Event-driven data alteration detection using block-chain. Secur. Priv., 4(2), e146.

    Article  Google Scholar 

  27. Tekerek, A. (2021). A novel architecture for web-based attack detection using convolutional neural network. Computers & Security, 100, 102096.

    Article  Google Scholar 

  28. Wilczyński, A., & Kołodziej, J. (2020). Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology. Simulation Modelling Practice and Theory, 99, 102038.

    Article  Google Scholar 

  29. Bousbaa, F. Z., Kerrache, C. A., Mahi, Z., Tahari, A. E. K., Lagraa, N., & Yagoubi, M. B. (2020). GeoUAVs: A new geocast routing protocol for fleet of UAVs. Computer Communications, 149, 259–269. https://doi.org/10.1016/j.comcom.2019.10.026

    Article  Google Scholar 

  30. Hubaux, J. P., Gross, T., Le Boudec, J. Y., & Vetterli, M. (2001). Toward self-organized mobile ad hoc networks: The terminodes project. IEEE Communications Magazine, 39(1), 118–124. https://doi.org/10.1109/35.894385

    Article  Google Scholar 

  31. Xia, H., Zhang, S. S., Li, Y., Pan, Z. K., Peng, X., & Cheng, X. Z. (2019). An attack-resistant trust inference model for securing routing in vehicular Ad hoc networks. IEEE Transactions on Vehicular Technology, 68(7), 7108–7120. https://doi.org/10.1109/TVT.2019.2919681

    Article  Google Scholar 

  32. Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., & Awajan, A. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509–521. https://doi.org/10.1016/j.future.2020.02.002

    Article  Google Scholar 

  33. Sarkar, S. (2019). Reliable and energy-aware routing in Mobile Ad-hoc networks. International Journal of Wireless and Mobile Computing, 16(2), 117–127. https://doi.org/10.1504/IJWMC.2019.099020

    Article  Google Scholar 

  34. Thalore, R., Vyas, V., Sharma, J., & Raina, V. (2021) Utilizing artificial intelligence to design delay and energy-aware wireless sensor networks,” in Artificial Intelligence and Global Society, Chapman and Hall/CRC, pp. 229–250.

  35. Hancer, E., Hodashinsky, I., Sarin, K., & Slezkin, A. (2021) A wrapper metaheuristic framework for handwritten signature verification, Soft Computing, pp. 1–17.

  36. Seo, J. H. (2020). Efficient digital signatures from RSA without random oracles. Information Sciences (Ny), 512, 471–480. https://doi.org/10.1016/j.ins.2019.09.084

    Article  MathSciNet  MATH  Google Scholar 

  37. Srivastava, A., Gupta, S. K., Najim, M., Sahu, N., Aggarwal, G., & Mazumdar, B. D. (2021). DSSAM: Digitally signed secure acknowledgement method for mobile ad hoc network. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1–29.

    Article  Google Scholar 

  38. Gupta, P., Sinha, A., Srivastava, P.K., Perti, A., & Singh, A.K. (2021). Security Implementations in IoT Using Digital Signature, in Innovations in Electrical and Electronic Engineering, Springer, pp. 523–535.

  39. Johnson, D.B., Maltz, D.A. (2007). Dynamic Source Routing in Ad Hoc Wireless Networks, in Mobile Computing, Springer US, pp. 153–181

  40. Wendzel, S., Keller, J. (2011). Low-attention forwarding for mobile network covert channels,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7025 LNCS, pp. 122–133, https://doi.org/10.1007/978-3-642-24712-5_10.

  41. Dholey, M. K., Sinha, D., Mukherjee, S., Das, A. K., & Sahana, S. K. (2020). A novel broadcast network design for routing in mobile Ad-Hoc network. IEEE Access, 8, 188269–188283. https://doi.org/10.1109/ACCESS.2020.3030802

    Article  Google Scholar 

  42. da Silva, E. C., & Gabriel, P. H. R. (2020). A comprehensive review of evolutionary algorithms for multiprocessor DAG scheduling. Computation, 8(2), 26.

    Article  Google Scholar 

  43. Pop, F., Dobre, C., Cristea, V. (2008). Performance analysis of grid DAG scheduling algorithms using MONARC simulation tool, in 2008 International Symposium on Parallel and Distributed Computing, pp. 131–138

  44. Bozdag, D., Ozguner, F., & Catalyurek, U. V. (2008). Compaction of schedules and a two-stage approach for duplication-based DAG scheduling. IEEE Transactions on Parallel and Distributed Systems, 20(6), 857–871.

    Article  Google Scholar 

  45. Harwood, S., Gambella, C., Trenev, D., Simonetto, A., Bernal, D., & Greenberg, D. (2021). Formulating and solving routing problems on quantum computers. IEEE Transaction on Quantum Engineering, 2, 1–17.

    Article  Google Scholar 

  46. Matta, P., Arora, M., & Sharma, D. (2021). A comparative survey on data encryption techniques: Big data perspective, Mater. Today Proc.

  47. Sharma, P., & Purushothama, B. R. (2022). BP-MGKM: An efficient multi-group key management scheme based on bivariate polynomial. Computer Networks, 216(2022), 109244.

    Article  Google Scholar 

  48. Kumar, A., et al. (2020). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessoors and Microsystems. https://doi.org/10.1016/j.micpro.2020.103352

    Article  Google Scholar 

  49. Kaiwartya, O., et al. (2017). Virtualization in wireless sensor networks: Fault tolerant embedding for internet of things. IEEE Internet of Things Journal, 5(2), 571–580.

    Article  Google Scholar 

  50. Roy, A., Pachuau, J.L., & Saha, A.K. (2021). An overview of queuing delay and various delay based algorithms in networks, Computing, pp. 1–39.

  51. Alrowaithy, M., & Thomas, N. (2019). Investigating the performance of C and C++ cryptographic libraries, in ACM International Conference Proceeding Series, pp. 167–170, https://doi.org/10.1145/3306309.3306335.

  52. Al-Zubaidie, M., Zhang, Z., & Zhang, J. (2020) REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs, Applied Sciences, 10(6).

  53. Rao, V., & KV, P. (2021). DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices. IET Wireless Sensor Systems, 11(2), 91–109.

    Article  Google Scholar 

  54. Yadav, S. K., Jha, S. K., Singh, S., Sharma, U. K., Dixit, P., Prakash, S., & Gangwar, A. (2022). An Efficient Model for IoT Security Using Adopted RSA, in Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021 (pp. 59–64). Singapore: Springer Nature Singapore.

Download references

Funding

The authors declare that no funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiv Prakash.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, S.K., Jha, S.K., Singh, S. et al. An Efficient and Secure Communication Mechanism for Internet of Things Based Connected Devices. Wireless Pers Commun 132, 1401–1422 (2023). https://doi.org/10.1007/s11277-023-10668-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10668-x

Keywords