Reference Hub2
DNA-Based Cryptographic Method for the Internet of Things

DNA-Based Cryptographic Method for the Internet of Things

Abdelkader Khobzaoui, Kadda Benyahia, Boualem Mansouri, Sofiane Boukli-Hacene
Copyright: © 2022 |Volume: 12 |Issue: 1 |Pages: 12
ISSN: 1947-9344|EISSN: 1947-9352|EISBN13: 9781683181385|DOI: 10.4018/IJOCI.2022010101
Cite Article Cite Article

MLA

Khobzaoui, Abdelkader, et al. "DNA-Based Cryptographic Method for the Internet of Things." IJOCI vol.12, no.1 2022: pp.1-12. http://doi.org/10.4018/IJOCI.2022010101

APA

Khobzaoui, A., Benyahia, K., Mansouri, B., & Boukli-Hacene, S. (2022). DNA-Based Cryptographic Method for the Internet of Things. International Journal of Organizational and Collective Intelligence (IJOCI), 12(1), 1-12. http://doi.org/10.4018/IJOCI.2022010101

Chicago

Khobzaoui, Abdelkader, et al. "DNA-Based Cryptographic Method for the Internet of Things," International Journal of Organizational and Collective Intelligence (IJOCI) 12, no.1: 1-12. http://doi.org/10.4018/IJOCI.2022010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of Things (IoT) is a set of connected smart devices providing and sharing rich data in real-time without involving a human being. However, IoT is a security nightmare because like in the early computer systems, security issues are not considered in the design step. Thereby, each IoT system could be susceptible to malicious users and uses. To avoid these types of situations, many approaches and techniques are proposed by both academic and industrial researches.DNA computing is an emerging and relatively new field dealing with data encryption using a DNA computing concepts. This technique allows rapid and secure data transfer between connected objects with low power consumption. In this paper, authors propose a symmetric cryptography method based on DNA. This method consists in cutting the message to encrypt/decrypt in blocks of characters and use a symmetric key extracted from a chromosome for encryption and decryption. Implemented on the embedded platform of a Raspberry Pi, the proposed method shows good performances in terms of robustness, complexity and attack resistance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.