Abstract
The Internet of Things (IoT) is a network of linked physical objects worldwide, communicating via the Internet to one another. IoT expects the interconnection between a few trillions of intelligent things and the collected information offers a lot of private information needs to be analyzed and transmitted. So the provision of security to the information is a major challenge for many current and future applications of IoT. Basically, the main components of IoTs are Smartphone, Wireless Sensor Networks (WSNs), Radio Frequency Identification (RFID), etc. The design and implementation of security and privacy management system for these things are driven by considerations such as good performance, information tampering, low power consumption, threat robustness and an end to end security. Security systems in IoT offer unauthorized access to information or other things by providing protection against modification or damage. In this paper, we propose a hybrid algorithm designed to preserve data confidentiality in IoT. Proposed algorithm design is a combination of Message Digest algorithm (MD5), Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) algorithms. The hybrid algorithm uses the concept of sharing geotag by destination IoT node to source node. Encryption involves three phases: Generation of fixed-length hash value i.e., hash function, encryption, and key generation. MD5 hash algorithm accepts plain text at the source IoT node as input and returns output a fixed length digest value. This value is encrypted using AES algorithm. Then ECC algorithm is applied to generate the encryption key. ECC offers a small key size and secured as compared to conventional cryptographic algorithms. We have simulated and analyzed the performance metrics of the proposed hybrid algorithm in terms of encryption time, memory utilization, end to end delay and decryption time w.r.t. varying file sizes as compared to AES encryption algorithm.
Similar content being viewed by others
References
Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): a vision, architectural elements, and future directions. J Future Gener Comput Syst. 2013;29(7):1645–60.
Covington M, Carskadden R. Threat implications of the Internet of Things. In: Proceedings of the 5th international conference on cyber conflict, Estonia; 2013, pp. 1–12.
Roman R, Najera P, Lopez J. Securing the Internet of Things. Int J Comput Netw. 2011;44(9):51–8.
Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Int J Comput Netw. 2010;54(15):2787–805.
Bandyopadhyay D, Sen J. Internet of Things: applications and challenges in technology and standardization. Int J Wirel Pers Commun. 2011;58(1):49–69.
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of Things: vision, applications and research challenges. Int J Ad Hoc Netw. 2012;10(7):1497–516.
Yang D, Liu F, Liang Y. A survey of Internet of Things. In: Proceedings of the international conference on e-business intelligence (ICEBI’10), vol. 978, China; 2010, pp. 78–99.
Gérald S. The Internet of Things. In: Sylvie W, editor. Harald S, Patrick G, Peter F. Cluster of European research projects on the Internet of Things, European Commission Information Society and Media, Belgium: Vision and Challenges for Realising the Internet of Things; 2010. pp. 9–27.
Nicolaie LF, Till R, Jochen S, Wittenstein AG, Stefan F. IoT Applications - Value Creation for Industry. In: Ovidiu V, Peter F, editors. Internet of Things - Converging Technologies for Smart Environments and Integrated Ecosystems. Aalborg Denmark: River Publishers Series in Communications; 2013. pp. 153–204.
Suo H, Wan J, Zou C, Liu J. Security in the Internet of Things: a review. In: Proceedings of the IEEE international conference on computer science and electronics engineering, vol. 3. China; 2012, pp. 648–651.
Yang G, Xu J, Chen W, Qi ZH, Wang HY. Security characteristics and technology in the Internet of Things. Int J Nanjing Univ Posts Telecommun. 2010;30(4):20–29.
Internet of Things Strategic Research Road map. http://www.internet-of-thingsresearch.eu/pdf...pdf. Accessed 10 Feb 2020.
Yuqiang, Jianlan G, Xuanzi H. The research of Internet of Things supporting technologies which face the logistics industry. In: Proceedings of the international conference computational intelligence and security, Spain; 2010, pp. 659–663.
Pan J, Paul S, Jain R. A survey of the research on future internet architectures. IEEE Commun Mag. 2011;49(7):26–36.
Atzori L, Lera A, AMorabito G. The Internet of Things: a survey. Int J Comput Netw. 2010;54(15):2787–805.
Al-Fuqaha J, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 2015;17(4):2347–76.
Mahmoud E, Seyed S, Hon C. The Internet of Things: new interoperability, management and security challenges. Int J Netw Secur Appl. 2016;8(2):85–102.
Inayat A, Sonia S, Zahid U. Internet of Things security, device authentication and access control: a review. Int J Comput Sci Inf Secur. 2016;14(8):456–66.
Yinghui H, Guanyu L. Descriptive models for Internet of Things. In: Proceedings of the IEEE international conference on intelligent control and information processing, China; 2010, pp. 483–486.
Surpon K, Panwit T. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the 11th international conference on wireless communications, networking and mobile computing (WiCOM’15), China; 2015, pp. 1–6.
Mahmoud E, Seyed S, Hon C. The Internet of Things: vision and challenges. In: Proceedings of the IEEE conference of IEEE region 10 (TENCON’13), Sydney; 2013, pp. 218–222.
Jing Q, Vasilakos AV, Wan J, Jingwei L, Dechao Q. Security of the Internet of Things: perspectives and challenges. Int J Mob Commun Comput Inf. 2014;20(8):2481–501.
Yang X, Li Z, Geng Z. Multi-layer security model for Internet of Things. Int J Internet Things. 2012;312(7):388–93.
Qiang C, Quan G, Bai Y, Yang L. Research on security issues of the Internet of Things. Int J Future Gener Commun Netw. 2013;6(6):1–10.
Farooq U, Waseem M, Mazhar S, Khairi A, Kamal T. A review on Internet of Things (IoT). Int J Comput Appl. 2015;113(1):1–7.
Sonar K, Upadhyay H. A survey: DDOS attack on Internet of Things. Int J Eng Res Dev. 2014;10(11):58–63.
Borgohain T, Kumar U, Sanyal S. Survey of security and privacy issues of Internet of Things. Int J Netw Appl. 2015;6(4):2372–8.
Mahmoud E, Seyed S, Hon C. The Internet of Things: vision and challenges. In: Proceedings of the TENCON spring conference, 2013, pp. 218–222.
Surapon K, Panwit T. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the 11th international conference on wireless communications, networking and mobile computing (WiCOM’15), 2015; pp. 1–6.
Qi Jing, Vasilakos Athanasios V, Wan J, Lu J, Dechao Q. Security of the Internet of Things: perspectives and challenges. Int J Wirel Netw. 2014;20(8):2481–501.
Yang X, Li Z, Geng Z, Zhang H. A multi-layer security model for Internet of Things. Int J IOT Workshop. 2012;312:388–93.
Sun X, Wang C. The research of security technology in the Internet of Things. Int J CSISE. 2011;105:113–9.
Weber RH. Internet of Things: privacy issues revisited. Int J Comput Law Secur. 2015;31(5):618–27.
Borgohain T, Kumar U, Sanyal S. Survey of security and privacy issues of Internet of Things. Int J Adv Netw Appl. 2015;6(4):2372–8.
Qiang C, Quan G, Bai Y, Yang L. Research on security issues of the Internet of Things. Int J Future Gener Commun Netw. 2013;6(6):1–10.
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of Things: vision, applications and research challenges. Int J Ad Hoc Netw. 2012;10(7):1497–516.
Farooq MU, Waseem M, Khairi A, Mazhar S. Critical analysis on the security concerns of Internet of Things (IoT). Int J Comput Appl. 2015;111(7):1–6.
Oriol P, Piol SR, Joakim E, Thiemo V. BSD based elliptic curve cryptography for the open Internet of Things. In: Proceedings of the 7th international conference on new technologies, mobility and security (NTMS’15), Paris; 2015, pp. 1–4.
Wang C. An IBE based security scheme on Internet of Things. In: Proceedings of the 2nd international conference on cloud computing and intelligence systems, China; 2012, pp. 32–37.
Rohollah K, Mohammad K. Enhancing security and confidentiality in location based data encryption algorithm. In: Proceedings of the 4th international conference on applications of digital informations and web technologies, USA; 2011, pp. 1–6.
Farooq MU, Waseem Muhammad, Khairi Anjum. Critical analysis on the security concerns of Internet of Things (IoT). Int J Comput Appl. 2015;111(7):1–8.
Shancang L. IoT node authentication. https://cdn.ttgtmedia.com/....ch4.pdf. Accessed 10 Apr 2020.
Mustafa EH, Masrullizam MI, Nurulfajar AM. Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security. Int J Telecommun Electron Comput Eng. 2018;10(1):139–45.
Rayarapu A, Saxena A, Krishna NV, Mundhra D. Securing files using AES algorithm. Int J Comput Sci Inf Technol. 2013;4(3):433–5.
Vahdati Z, Ghasempour A, Salehi M. Comparison of ECC and RSA algorithms in IOT devices. Int J Theor Appl Inf Technol. 2016;97(16):4293–308.
Manvi SS, Kakkasageri MS. Message authentication in vehicular ad hoc networks (VANETs): ECDSA based approach. In: Proceedings of the international conference on future computer and communication, Malaysia, 2009.
Zargar AJ. Encryption and decryption using elliptical curve cryptography. Int J Adv Res Comput Sci. 2017;8(7):48–51.
Rivest R. The MD5 message-digest algorithm. RFC Editor; 1992.
Kasgar AK, Dhariwal MK, Tantubay N, Malviya H. A review paper of message digest 5 (MD5). Int J Mod Eng Manag Res. 2013;1(4):29–35.
Pedro SM, Nam T, Brandon C, Behnam D, Yuhong L. Analyzing the resource utilization of AES encryption on IoT devices. In: Asia Pacific signal and information processing association annual summit and conference, Hawaii, USA; 2018.
khambra D, Dabas P. Secure data transmission using AES in IoT. Int J Appl Innov Eng Manag. 2017;6(6):283–9.
Samiksha S, Vinay C. Analysis of AES encryption with ECC. In: Proceedings of the international conference on engineering science and management, Goa; 2016, pp. 195–201.
Haya H, Tasneem S, Dina S, Jamal Zemerly M, Chan YY, Mahmoud A-Q, Yousof AH. Secure lightweight ECC based protocol for multiagent IoT systems. In: Proceedings of the 13th international conference on wireless and mobile computing, networking and communications (WiMob’17), Rome, 2017.
Tiwari Harsh Durga, Kim Jae Hyung. Novel method for DNA based elliptic curve cryptography for IoT devices. Int J Electron Telecommun Res Inst. 2018;40(3):396–409.
Chandu Y, Rakesh Kumar KS, Khanolkar NV, Anish AN, Rawal S. Design and implementation of hybrid encryption for security of IOT data. In: Proceedings of the international conference on smart technologies for smart nation (SmartTechCon’17), Bangalore, August 2017.
Kavitha S, Alphonse PJA. A hybrid cryptosystem to enhance security in IoT health care system. Int J Wirel Microw Technol. 2019;1:1–10.
Trivedi DM, Raval TJ. Improving communication security in IoT using hybrid encryption decryption. Int J Adv Res Innov Ideas Educ. 2018;4(2):4175–82.
Tenzin Kunchok, Kirubanand VB. A light weight hybrid encryption technique to secure IoT data transmission. Int J Eng Technol. 2018;7(2):1–9.
Aruna Sankaralingam S, Usha G, Acharya Ankita. A hybrid cryptographic algorithm based on AES and SHA in RFID. Int J Pure Appl Math. 2018;118(11):835–40.
Jain Avinash, Kapoor V. Novel hybrid cryptography for confidentiality, integrity, authentication. Int J Comput Appl. 2017;171(8):35–40.
Chanal PM, Kakkasageri MS. Hybrid algorithm for data confidentiality in Internet of Things. In: Proceedings of the 11th international conference on computing, communication and networking technologies (ICCCNT19), IIT, Kanpur, India, July 6–8, 2019.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Author Mrs. Poornima M. Chanal declares that she has no conflict of interest. Author Dr. Mahabaleshwar S. Kakkasageri declares that he has no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chanal, P.M., Kakkasageri, M.S. Preserving Data Confidentiality in Internet of Things. SN COMPUT. SCI. 2, 53 (2021). https://doi.org/10.1007/s42979-020-00429-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-020-00429-z