Abstract
Internet of Things (IoT) as a ubiquitous paradigm is a new concept in Information and Communications Technology (ICT) and has the ability to connect wireless and mobile embedded devices and things to the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of smart and interconnected objects that are potentially vulnerable to different attacks. Thus, the security of resource-constrained devices in IoT is highly important. As an important solution, cryptographic algorithms are used to provide confidentiality and integrity of the transmitted data between the sender and receiver. Hence, this paper proposes a new hybrid cryptographic algorithm based on Rivest cipher (RC4), Elliptic-Curve Cryptography (ECC), and Secure Hash Algorithm (SHA-256) to protect sensitive information in IoT-based smart irrigation systems. In this paper, the RC4 key is encrypted by the ECC algorithm, and the output of this encryption process is transformed to SHA-256 for hashing and generating enigmatic data. SHA-256 algorithm encrypts RC4 based cipher text to improve data integrity. Comprehensive analysis and simulation results indicate that the proposed scheme is secure to various known attacks such as the Man-in-the-middle (MiM) attack, and has a better performance than other cryptographic algorithms. Also, the obtained results confirm the effectiveness of the proposed model and robustness in order to confidentiality based on analyzing secrecy.
Similar content being viewed by others
References
Abinaya E, Aishwarva K, Lordwin CPM, Kamatchi G, Malarvizhi I (2018) A performance aware security framework to avoid software attacks on Internet of Things (IoT) based patient monitoring system. Int Conf Curr Trends Towards Converg Technol (ICCTCT). https://doi.org/10.1109/ICCTCT.2018.8550955
Agale RR, Gaikwad DP (2017) Automated irrigation and crop security system in agriculture using Internet of Things. Int Conf Comput Commun Control Autom (ICCUBEA). https://doi.org/10.1109/ICCUBEA.2017.8463726
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: A survey. J Netw Comput Appl 88:10–28
Azari L, Ghaffari A (2015) Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks. Indian J Sci Technol 8:859–867
Babayiğit B, Büyükpatpat B (2019) Design and implementation of IoT-based irrigation system. Int Conf Comput Sci Eng (UBMK). https://doi.org/10.1109/UBMK.2019.8907066
Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) PHOABE: Securely outsourcing multiauthority attribute based encryption with policy hidden for cloud assisted IoT. Comput Netw 133:141–156
Burton L, Dave N, Fernandez R, Jayachandran K, Bhansali S (2018) Smart gardening IoT soil sheets for real-time nutrient analysis. J Electrochem Soc 165:B3157
Chandu Y, Kumar KSR, Prabhukhanolkar NV, Anish AN, Rawal S (2017) Design and implementation of hybrid encryption for security of IOT data. Int Conf On Smart Technol Smart Nation (SmartTechCon). https://doi.org/10.1109/SmartTechCon.2017.8358562
Chen J, Tian Z, Cui X, Yin L, Wang X (2019) Trust architecture and reputation evaluation for internet of things. Ambient Intell Humaniz Comput 10:3099–3107. https://doi.org/10.1007/s12652-018-0887-z
Chhabra A, Arora S (2017) An elliptic curve cryptography based encryption scheme for securing the cloud against eavesdropping attacks. Int Conf Collab Internet Comput (CIC). https://doi.org/10.1109/CIC.2017.00040
Ghaffari A (2014) Designing a wireless sensor network for ocean status notification system. Indian J Sci Technol 7:809
Ghaffari A, Rahmani A (2008) Fault tolerant model for data dissemination in wireless sensor networks. In: 2008 International Symposium on Information Technology, IEEE, pp 1–8.
Ghaffari A, Takanloo VA (2011) QoS-based routing protocol with load balancing for wireless multimedia sensor networks using genetic algorithm. World Appl Sci J 15:1659–1666
Gilbert H, Handschuh H (2004) Security analysis of SHA-256 and Sisters. In: Matsui M, Zuccherato RJ (eds) Selected areas in cryptography, Berlin, Heidelberg. Springer, Berlin, pp 175–193
Gulati A, Thakur S (2018) Smart irrigation using Internet of Things. Int Conf Cloud Comput Data Sci Eng (Conflu). https://doi.org/10.1109/CONFLUENCE.2018.8442928
Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Gener Comput Syst 91:434–449. https://doi.org/10.1016/j.future.2018.09.024
Han Q, Zhang Y, Li H (2018) Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Gener Comput Syst 83:269–277. https://doi.org/10.1016/j.future.2018.01.019
Hendrawan INR, Yulyantari LP, Pradiptha GA, Starriawan PB (2019) Fuzzy based internet of things irrigation system. Int Conf Cybern Intell System (ICORIS). https://doi.org/10.1109/ICORIS.2019.8874900
Hu Z (2011) A method for the signature of things. In: International Conference on Intelligence Science and Information Engineering, pp. 366–369.
Hussain I, Negi MC, Pandey N (2017) A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer. Int Conf Infocom Technol Unmanned Syst. https://doi.org/10.1109/ICTUS.2017.8286054
Jan MA, Khan F, Alam M, Usman M (2019) A payload-based mutual authentication scheme for Internet of Things. Future Gener Comput Syst 92:1028–1039. https://doi.org/10.1016/j.future.2017.08.035
Jazebi SJ, Ghaffari A (2020) RISA: routing scheme for Internet of Things using shuffled frog leaping optimization algorithm. Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01708-6
Jisha S, Philip M (2016) Rfid based security platform for internet of things in health care environment. Online Int Conf Green Eng Technol. https://doi.org/10.1109/GET.2016.7916693
KeyKhosravi D, Ghaffari A, Hosseinalipour A, Khasragi BA (2010) New clustering protocol to decrease probability failure nodes and increasing the lifetime in WSNs. Int J Adv Comp Techn 2:117–121
Khabiri M, Ghaffari A (2018) Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wirel Pers Commun 98:2473–2495
Khader M, Alian M, Hraiz R, Almajali S (2017) Simplified AES algorithm for healthcare applications on Internet of Thing. Int Conf Inform Technol (ICIT). https://doi.org/10.1109/ICITECH.2017.8080056
Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2012) A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. Ann IEEE Conf on Local Comput Netw-Workshops. https://doi.org/10.1109/LCNW.2012.6424088
Lee J, Oh S, Jang JW (2015) A work in progress: context based encryption scheme for internet of things. Proced Comput Sci 56:271–275. https://doi.org/10.1016/j.procs.2015.07.208
Li M, Sun Y, Lu H, Maharjan S, Tian Z (2019) Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2962914
Liu Z, Huang X, Hu Z, Khan MK, Seo H, Zhou L (2016) On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans Dep Sec Comput 14:237–248
Mao J, Zhu H, Liu Y, Liu Y, Qian W, Zhang J, Huang X (2018) RSA-based handshake protocol in internet of things. Int Conf Inform Technol Med Educ (ITME). https://doi.org/10.1109/ITME.2018.00220
Matsemela G, Rimer S, Ouahada K, Ndjiongue R, Mngomezulu Z (2017) Internet of things data integrity. IST-Afr Week Conf (IST-Afr). https://doi.org/10.23919/ISTAFRICA.2017.8102332
Mektoubi A, Hassani HL, Belhadaoui H, Rifi M, Zakari A (2016) New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve. Third Int Conf Syst Collab (SysCo). https://doi.org/10.1109/SYSCO.2016.7831326
Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in Cryptology CRYPTO ’85 proceedings, Berlin, Heidelberg. Springer, Berlin, pp 417–426
Mohammadi R, Ghaffari A (2015) Optimizing reliability through network coding in wireless multimedia sensor networks Indian. J Sci Technol 8:834
Odelu V, Das AK, Khan MK, Choo KR, Jo M (2017) Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5:3273–3283. https://doi.org/10.1109/ACCESS.2017.2669940
Pant VK, Prakash J, Asthana A (2015) Three step data security model for cloud computing based on RSA and steganography. Int Conf Green Comput Internet Things (ICGCIoT). https://doi.org/10.1109/ICGCIoT.2015.7380514
Qiu J, Du L, Zhang D, Su S, Tian Z (2020a) Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City. IEEE Trans Ind Inform 16:2659–2666. https://doi.org/10.1109/TII.2019.2943906
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020b) A survey on access control in the age of internet of things. IEEE Inter of Things J. https://doi.org/10.1109/JIOT.2020.2969326
Ragab A, Selim G, Wahdan A, Madani A (2019a) Robust hybrid lightweight cryptosystem for protecting IoT smart devices International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2019: Security, Privacy, and Anonymity in Computation, Communication, and Storage, LNCS 11637:5–19.
Ragab AAM, Madani A, Wahdan AM, Selim GMI (2019b) Hybrid cryptosystems for protecting IoT smart devices with comparative analysis and evaluation. In: Arai K, Bhatia R, Kapoor S (eds) Proceedings of the Future Technologies Conference (FTC). Springer International Publishing, Cham, pp 862–876
Saha R, Geetha G, Kumar G, Kim T-H, Buchanan WJ (2019) MRC4: a modified rc4 algorithm using symmetric random function generator for improved cryptographic features. IEEE Access 7:172045–172054
Sharma G, Kalra S (2018) A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. J Netw Comput Appl 42:95–106. https://doi.org/10.1016/j.jisa.2018.08.003
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0494-4
Stinson DR (1995) Cryptography: theory and (2005th ed). CRC Press, Boca Raton
Suárez-Albela M, Fernández-Caramés TM, Fraga-Lamas P, Castedo L (2018) A practical performance comparison of ecc and rsa for resource-constrained IoT devices. Glob Internet Things Summit (GIoTS). https://doi.org/10.1109/GIOTS.2018.8534575
Tian Z et al (2019) Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans on Indust Inform 15:4285–4294. https://doi.org/10.1109/TII.2019.2907754
Tian Z, Gao X, Su S, Qiu J (2020) Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles. IEEE Internet Things J 7:3901–3909. https://doi.org/10.1109/JIOT.2019.2951620
Tian Z, Luo C, Qiu J, Du X, Guizani M (2020) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Ind Inform 16:1963–1971. https://doi.org/10.1109/TII.2019.2938778
Touati L, Challal Y (2016) Collaborative KP-ABE for cloud-based Internet of Things applications. IEEE Int Conf Commun (ICC). https://doi.org/10.1109/ICC.2016.7510836
Weerasinghe TDB (2013) An effective RC4 stream cipher. IEEE Eight Int Conf Ind Inform Syst. https://doi.org/10.1109/ICIInfS.2013.6731957
Wei P, Zhou Z (2018) Research on security of information sharing in Internet of Things based on key algorithm. Future Gener Comput Syst 88:599–605. https://doi.org/10.1016/j.future.2018.04.035
Wu L, Chen B, Choo K-KR, He D (2018) Efficient and secure searchable encryption protocol for cloud-based Internet of Things. J Parall Distrib Comput 111:152–161. https://doi.org/10.1016/j.jpdc.2017.08.007
Xu L, Li J, Chen X, Li W, Tang S, Wu H-T (2019) Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J Netw Comput Appl 128:11–20. https://doi.org/10.1016/j.jnca.2018.12.003
Xu S, Yang G, Mu Y, Liu X (2019) A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener Comput Syst 97:284–294. https://doi.org/10.1016/j.future.2019.02.051
Yang Y, Zheng X, Tang C (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37. https://doi.org/10.1016/j.jnca.2016.11.017
Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 49:104–112. https://doi.org/10.1016/j.future.2014.10.010
Yoshida H, Biryukov A (2006) Analysis of a SHA-256 variant. In: Preneel B, Tavares S (eds) Selected areas in cryptography, Berlin, Heidelberg, 2006. Springer, Berlin, pp 245–260
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mousavi, S.K., Ghaffari, A., Besharat, S. et al. Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems. J Ambient Intell Human Comput 12, 2033–2051 (2021). https://doi.org/10.1007/s12652-020-02303-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02303-5