Skip to main content
Log in

Preserving Data Confidentiality in Internet of Things

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a network of linked physical objects worldwide, communicating via the Internet to one another. IoT expects the interconnection between a few trillions of intelligent things and the collected information offers a lot of private information needs to be analyzed and transmitted. So the provision of security to the information is a major challenge for many current and future applications of IoT. Basically, the main components of IoTs are Smartphone, Wireless Sensor Networks (WSNs), Radio Frequency Identification (RFID), etc. The design and implementation of security and privacy management system for these things are driven by considerations such as good performance, information tampering, low power consumption, threat robustness and an end to end security. Security systems in IoT offer unauthorized access to information or other things by providing protection against modification or damage. In this paper, we propose a hybrid algorithm designed to preserve data confidentiality in IoT. Proposed algorithm design is a combination of Message Digest algorithm (MD5), Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) algorithms. The hybrid algorithm uses the concept of sharing geotag by destination IoT node to source node. Encryption involves three phases: Generation of fixed-length hash value i.e., hash function, encryption, and key generation. MD5 hash algorithm accepts plain text at the source IoT node as input and returns output a fixed length digest value. This value is encrypted using AES algorithm. Then ECC algorithm is applied to generate the encryption key. ECC offers a small key size and secured as compared to conventional cryptographic algorithms. We have simulated and analyzed the performance metrics of the proposed hybrid algorithm in terms of encryption time, memory utilization, end to end delay and decryption time w.r.t. varying file sizes as compared to AES encryption algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): a vision, architectural elements, and future directions. J Future Gener Comput Syst. 2013;29(7):1645–60.

    Article  Google Scholar 

  2. Covington M, Carskadden R. Threat implications of the Internet of Things. In: Proceedings of the 5th international conference on cyber conflict, Estonia; 2013, pp. 1–12.

  3. Roman R, Najera P, Lopez J. Securing the Internet of Things. Int J Comput Netw. 2011;44(9):51–8.

    Google Scholar 

  4. Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Int J Comput Netw. 2010;54(15):2787–805.

    Article  Google Scholar 

  5. Bandyopadhyay D, Sen J. Internet of Things: applications and challenges in technology and standardization. Int J Wirel Pers Commun. 2011;58(1):49–69.

    Article  Google Scholar 

  6. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of Things: vision, applications and research challenges. Int J Ad Hoc Netw. 2012;10(7):1497–516.

    Article  Google Scholar 

  7. Yang D, Liu F, Liang Y. A survey of Internet of Things. In: Proceedings of the international conference on e-business intelligence (ICEBI’10), vol. 978, China; 2010, pp. 78–99.

  8. Gérald S. The Internet of Things. In: Sylvie W, editor. Harald S, Patrick G, Peter F. Cluster of European research projects on the Internet of Things, European Commission Information Society and Media, Belgium: Vision and Challenges for Realising the Internet of Things; 2010. pp. 9–27.

  9. Nicolaie LF, Till R, Jochen S, Wittenstein AG, Stefan F. IoT Applications - Value Creation for Industry. In: Ovidiu V, Peter F, editors. Internet of Things - Converging Technologies for Smart Environments and Integrated Ecosystems. Aalborg Denmark: River Publishers Series in Communications; 2013. pp. 153–204.

    Google Scholar 

  10. Suo H, Wan J, Zou C, Liu J. Security in the Internet of Things: a review. In: Proceedings of the IEEE international conference on computer science and electronics engineering, vol. 3. China; 2012, pp. 648–651.

  11. Yang G, Xu J, Chen W, Qi ZH, Wang HY. Security characteristics and technology in the Internet of Things. Int J Nanjing Univ Posts Telecommun. 2010;30(4):20–29.

    Google Scholar 

  12. Internet of Things Strategic Research Road map. http://www.internet-of-thingsresearch.eu/pdf...pdf. Accessed 10 Feb 2020.

  13. Yuqiang, Jianlan G, Xuanzi H. The research of Internet of Things supporting technologies which face the logistics industry. In: Proceedings of the international conference computational intelligence and security, Spain; 2010, pp. 659–663.

  14. Pan J, Paul S, Jain R. A survey of the research on future internet architectures. IEEE Commun Mag. 2011;49(7):26–36.

    Article  Google Scholar 

  15. Atzori L, Lera A, AMorabito G. The Internet of Things: a survey. Int J Comput Netw. 2010;54(15):2787–805.

    Article  Google Scholar 

  16. Al-Fuqaha J, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 2015;17(4):2347–76.

    Article  Google Scholar 

  17. Mahmoud E, Seyed S, Hon C. The Internet of Things: new interoperability, management and security challenges. Int J Netw Secur Appl. 2016;8(2):85–102.

    Google Scholar 

  18. Inayat A, Sonia S, Zahid U. Internet of Things security, device authentication and access control: a review. Int J Comput Sci Inf Secur. 2016;14(8):456–66.

    Google Scholar 

  19. Yinghui H, Guanyu L. Descriptive models for Internet of Things. In: Proceedings of the IEEE international conference on intelligent control and information processing, China; 2010, pp. 483–486.

  20. Surpon K, Panwit T. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the 11th international conference on wireless communications, networking and mobile computing (WiCOM’15), China; 2015, pp. 1–6.

  21. Mahmoud E, Seyed S, Hon C. The Internet of Things: vision and challenges. In: Proceedings of the IEEE conference of IEEE region 10 (TENCON’13), Sydney; 2013, pp. 218–222.

  22. Jing Q, Vasilakos AV, Wan J, Jingwei L, Dechao Q. Security of the Internet of Things: perspectives and challenges. Int J Mob Commun Comput Inf. 2014;20(8):2481–501.

    Google Scholar 

  23. Yang X, Li Z, Geng Z. Multi-layer security model for Internet of Things. Int J Internet Things. 2012;312(7):388–93.

    Google Scholar 

  24. Qiang C, Quan G, Bai Y, Yang L. Research on security issues of the Internet of Things. Int J Future Gener Commun Netw. 2013;6(6):1–10.

    Article  Google Scholar 

  25. Farooq U, Waseem M, Mazhar S, Khairi A, Kamal T. A review on Internet of Things (IoT). Int J Comput Appl. 2015;113(1):1–7.

    Google Scholar 

  26. Sonar K, Upadhyay H. A survey: DDOS attack on Internet of Things. Int J Eng Res Dev. 2014;10(11):58–63.

    Google Scholar 

  27. Borgohain T, Kumar U, Sanyal S. Survey of security and privacy issues of Internet of Things. Int J Netw Appl. 2015;6(4):2372–8.

    Google Scholar 

  28. Mahmoud E, Seyed S, Hon C. The Internet of Things: vision and challenges. In: Proceedings of the TENCON spring conference, 2013, pp. 218–222.

  29. Surapon K, Panwit T. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the 11th international conference on wireless communications, networking and mobile computing (WiCOM’15), 2015; pp. 1–6.

  30. Qi Jing, Vasilakos Athanasios V, Wan J, Lu J, Dechao Q. Security of the Internet of Things: perspectives and challenges. Int J Wirel Netw. 2014;20(8):2481–501.

    Article  Google Scholar 

  31. Yang X, Li Z, Geng Z, Zhang H. A multi-layer security model for Internet of Things. Int J IOT Workshop. 2012;312:388–93.

    Google Scholar 

  32. Sun X, Wang C. The research of security technology in the Internet of Things. Int J CSISE. 2011;105:113–9.

    Google Scholar 

  33. Weber RH. Internet of Things: privacy issues revisited. Int J Comput Law Secur. 2015;31(5):618–27.

    Article  Google Scholar 

  34. Borgohain T, Kumar U, Sanyal S. Survey of security and privacy issues of Internet of Things. Int J Adv Netw Appl. 2015;6(4):2372–8.

    Google Scholar 

  35. Qiang C, Quan G, Bai Y, Yang L. Research on security issues of the Internet of Things. Int J Future Gener Commun Netw. 2013;6(6):1–10.

    Article  Google Scholar 

  36. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of Things: vision, applications and research challenges. Int J Ad Hoc Netw. 2012;10(7):1497–516.

    Article  Google Scholar 

  37. Farooq MU, Waseem M, Khairi A, Mazhar S. Critical analysis on the security concerns of Internet of Things (IoT). Int J Comput Appl. 2015;111(7):1–6.

    Google Scholar 

  38. Oriol P, Piol SR, Joakim E, Thiemo V. BSD based elliptic curve cryptography for the open Internet of Things. In: Proceedings of the 7th international conference on new technologies, mobility and security (NTMS’15), Paris; 2015, pp. 1–4.

  39. Wang C. An IBE based security scheme on Internet of Things. In: Proceedings of the 2nd international conference on cloud computing and intelligence systems, China; 2012, pp. 32–37.

  40. Rohollah K, Mohammad K. Enhancing security and confidentiality in location based data encryption algorithm. In: Proceedings of the 4th international conference on applications of digital informations and web technologies, USA; 2011, pp. 1–6.

  41. Farooq MU, Waseem Muhammad, Khairi Anjum. Critical analysis on the security concerns of Internet of Things (IoT). Int J Comput Appl. 2015;111(7):1–8.

    Google Scholar 

  42. Shancang L. IoT node authentication. https://cdn.ttgtmedia.com/....ch4.pdf. Accessed 10 Apr 2020.

  43. Mustafa EH, Masrullizam MI, Nurulfajar AM. Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security. Int J Telecommun Electron Comput Eng. 2018;10(1):139–45.

    Google Scholar 

  44. Rayarapu A, Saxena A, Krishna NV, Mundhra D. Securing files using AES algorithm. Int J Comput Sci Inf Technol. 2013;4(3):433–5.

    Google Scholar 

  45. Vahdati Z, Ghasempour A, Salehi M. Comparison of ECC and RSA algorithms in IOT devices. Int J Theor Appl Inf Technol. 2016;97(16):4293–308.

    Google Scholar 

  46. Manvi SS, Kakkasageri MS. Message authentication in vehicular ad hoc networks (VANETs): ECDSA based approach. In: Proceedings of the international conference on future computer and communication, Malaysia, 2009.

  47. Zargar AJ. Encryption and decryption using elliptical curve cryptography. Int J Adv Res Comput Sci. 2017;8(7):48–51.

    Article  Google Scholar 

  48. Rivest R. The MD5 message-digest algorithm. RFC Editor; 1992.

  49. Kasgar AK, Dhariwal MK, Tantubay N, Malviya H. A review paper of message digest 5 (MD5). Int J Mod Eng Manag Res. 2013;1(4):29–35.

    Google Scholar 

  50. Pedro SM, Nam T, Brandon C, Behnam D, Yuhong L. Analyzing the resource utilization of AES encryption on IoT devices. In: Asia Pacific signal and information processing association annual summit and conference, Hawaii, USA; 2018.

  51. khambra D, Dabas P. Secure data transmission using AES in IoT. Int J Appl Innov Eng Manag. 2017;6(6):283–9.

    Google Scholar 

  52. Samiksha S, Vinay C. Analysis of AES encryption with ECC. In: Proceedings of the international conference on engineering science and management, Goa; 2016, pp. 195–201.

  53. Haya H, Tasneem S, Dina S, Jamal Zemerly M, Chan YY, Mahmoud A-Q, Yousof AH. Secure lightweight ECC based protocol for multiagent IoT systems. In: Proceedings of the 13th international conference on wireless and mobile computing, networking and communications (WiMob’17), Rome, 2017.

  54. Tiwari Harsh Durga, Kim Jae Hyung. Novel method for DNA based elliptic curve cryptography for IoT devices. Int J Electron Telecommun Res Inst. 2018;40(3):396–409.

    Google Scholar 

  55. Chandu Y, Rakesh Kumar KS, Khanolkar NV, Anish AN, Rawal S. Design and implementation of hybrid encryption for security of IOT data. In: Proceedings of the international conference on smart technologies for smart nation (SmartTechCon’17), Bangalore, August 2017.

  56. Kavitha S, Alphonse PJA. A hybrid cryptosystem to enhance security in IoT health care system. Int J Wirel Microw Technol. 2019;1:1–10.

    Google Scholar 

  57. Trivedi DM, Raval TJ. Improving communication security in IoT using hybrid encryption decryption. Int J Adv Res Innov Ideas Educ. 2018;4(2):4175–82.

    Google Scholar 

  58. Tenzin Kunchok, Kirubanand VB. A light weight hybrid encryption technique to secure IoT data transmission. Int J Eng Technol. 2018;7(2):1–9.

    Google Scholar 

  59. Aruna Sankaralingam S, Usha G, Acharya Ankita. A hybrid cryptographic algorithm based on AES and SHA in RFID. Int J Pure Appl Math. 2018;118(11):835–40.

    Google Scholar 

  60. Jain Avinash, Kapoor V. Novel hybrid cryptography for confidentiality, integrity, authentication. Int J Comput Appl. 2017;171(8):35–40.

    Google Scholar 

  61. Chanal PM, Kakkasageri MS. Hybrid algorithm for data confidentiality in Internet of Things. In: Proceedings of the 11th international conference on computing, communication and networking technologies (ICCCNT19), IIT, Kanpur, India, July 6–8, 2019.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Poornima M. Chanal.

Ethics declarations

Conflict of interest

Author Mrs. Poornima M. Chanal declares that she has no conflict of interest. Author Dr. Mahabaleshwar S. Kakkasageri declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chanal, P.M., Kakkasageri, M.S. Preserving Data Confidentiality in Internet of Things. SN COMPUT. SCI. 2, 53 (2021). https://doi.org/10.1007/s42979-020-00429-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-020-00429-z

Keywords

Navigation