Academia.eduAcademia.edu

Outline

Internet of Things Protection and Encryption: A Survey

2021, 2021 22nd International Arab Conference on Information Technology (ACIT)

https://doi.org/10.1109/ACIT53391.2021.9677225

Abstract

The Internet of Things (IoT) has enabled a wide range of sectors to interact effectively with their consumers in order to deliver seamless services and products. Despite the widespread availability of (IoT) devices and their Internet connectivity, they have a low level of information security integrity. A number of security methods were proposed and evaluated in our research, and comparisons were made in terms of energy and time in the encryption and decryption processes. A ratification procedure is also performed on the devices in the main manager, which is regarded as a full firewall for IoT devices. The suggested algorithm's success has been shown utilizing low-cost Adriano Uno and Raspberry Pi devices. Arduous Uno has been used to demonstrate the encryption process in low-energy devices using a variety of algorithms, including Enhanced Algorithm for Data Integrity and Authentication (EDAI) and raspberry, which serves as a safety manager in low-energy device molecules. A variety of enhanced algorithms used in conjunction with Blockchain software have also assured the security and integrity of the information. These findings and discussions are presented at the conclusion of the paper.

References (64)

  1. Vinoj, P.G., Jacob, S. and Menon, V.G., 2018, September. Hybrid brainactuated muscle interface for the physically disabled. In Basic & Clinical Pharmacology & Toxicology (Vol. 123, pp. 8-9). 111 RIVER ST, HOBOKEN 07030-5774, NJ USA: Wiley.
  2. Samara, G. and Aljaidi, M., 2019. Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks. International Journal of Electrical & Computer Engineering (2088-8708), 9(1).
  3. Ploennigs, J., Cohn, J. and Stanford-Clark, A., 2018. The future of IoT. IEEE Internet of Things Magazine, 1(1), pp.28-33.
  4. Haimour, S., Al-Mousa, M.R. and Marie, R.R., 2021. Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images. International Journal of Advanced Trends in Computer Science and Engineering.
  5. Alhmiedat, T. and Samara, G., 2017. A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring. International Journal of Computer Science and Information Security (IJCSIS), 15(1).
  6. Salem, A.O.A., Samara, G. and Alhmiedat, T., 2014. Performance Analysis of Dynamic Source Routing Protocol. Journal of Emerging Trends in Computing and Information Sciences, 5(2).
  7. Salem, A.O.A., Alhmiedat, T. and Samara, G., 2013. Cache Discovery Policies of MANET. World of Computer Science & Information Technology Journal, 3(8).
  8. Alhmiedat, T.A., Abutaleb, A. and Samara, G., 2013. A prototype navigation system for guiding blind people indoors using NXT Mindstorms. International Journal of Online and Biomedical Engineering (iJOE), 9(5), pp.52-58.
  9. Philip, V., Suman, V.K., Menon, V.G. and Dhanya, K.A., 2017. A review on latest internet of things based healthcare applications. International Journal of Computer Science and Information Security, 15(1), p.248.
  10. Samara, G. and Alsalihy, W.A.A., 2012. Message broadcasting protocols in VANET. Information Technology Journal, 11(9), p.1235.
  11. Wang, B., Zhan, Y. and Zhang, Z., 2018. Cryptanalysis of a symmetric fully homomorphic encryption scheme. IEEE Transactions on Information Forensics and Security, 13(6), pp.1460-1467.
  12. M Khatari, G Samara, 2015, Congestion control approach based on effective random early detection and fuzzy logic, MAGNT Research Report, Vol.3 (8). PP: 180-193.
  13. Maimut, D. and Reyhanitabar, R., 2014. Authenticated encryption: Toward next-generation algorithms. IEEE security & privacy, 12(2), pp.70-72.
  14. Al-Mousa, M.R., 2021. Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning. International Journal of Advanced Trends in Computer Science and Engineering, 2020.
  15. Samara, Ghassan. 2020. Lane prediction optimization in VANET. Egyptian Informatics Journal.
  16. Bordel, B., Alcarria, R., De Andrés, D.M. and You, I., 2018. Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access, 6, pp.47472-47488.
  17. Samara, G. and Alsalihy, W.A.A., 2012, June. A new security mechanism for vehicular communication networks. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 18-22). IEEE.
  18. Kim, J., Caire, G. and Molisch, A.F., 2015. Quality-aware streaming and scheduling for device-to-device video delivery. IEEE/ACM Transactions on Networking, 24(4), pp.2319-2331.
  19. Samara, G., Alsalihy, W.A.H.A. and Ramadass, S., 2011. Increase emergency message reception in vanet. Journal of applied sciences, 11(14), pp.2606-2612.
  20. Samara, G., 2018. An intelligent routing protocol in VANET. International Journal of Ad Hoc and Ubiquitous Computing, 29(1-2), pp.77-84.
  21. Ban, H.J., Choi, J. and Kang, N., 2016. Fine-grained support of security services for resource constrained internet of things. International Journal of Distributed Sensor Networks, 12(5), p.7824686.
  22. El-Haii, M., Chamoun, M., Fadlallah, A. and Serhrouchni, A., 2018, October. Analysis of cryptographic algorithms on iot hardware platforms. In 2018 2nd Cyber Security in Networking Conference (CSNet) (pp. 1-5). IEEE.
  23. Rasmi, M. and Al-Qawasmi, K.E., 2016. Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis. International Journal of Security and Its Applications, 10(5), pp.297-308.
  24. Nada, J.A. and Al-Mosa, M.R., 2018, November. A proposed wireless intrusion detection prevention and attack system. In 2018 International Arab Conference on Information Technology (ACIT) (pp. 1-5). IEEE.
  25. Samara, G., 2020. Intelligent reputation system for safety messages in VANET. IAES International Journal of Artificial Intelligence, 9(3), p.439.
  26. Samara, G., Al-Salihy, W.A. and Sures, R., 2010, May. Efficient certificate management in VANET. In 2010 2nd International Conference on Future Computer and Communication (Vol. 3, pp. V3- 750). IEEE.
  27. Landge, I.A. and Satopay, H., 2018, February. Secured IoT through hashing using MD5. In 2018 fourth international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB) (pp. 1-5). IEEE.
  28. Samara, G., Ramadas, S., Al-Salihy, W.A.H. 2010. Safety message power transmission control for vehicular Ad hoc Networks. Journal of Computer Science,, 6(10), pp. 1056-1061.
  29. Ebrahim, M. and Chong, C.W., 2013, November. Secure Force: A low- complexity cryptographic algorithm for Wireless Sensor Network (WSN). In 2013 IEEE International Conference on Control System, Computing and Engineering (pp. 557-562). IEEE.
  30. Al-Mousa, M.R., 2021, July. Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics. In 2021 International Conference on Information Technology (ICIT) (pp. 654-659). IEEE.
  31. Samara, G., Alsalihy, W.A.A. and Ramadass, S., 2011. Increasing Network Visibility Using Coded Repetition Beacon Piggybacking. World Applied Sciences Journal, 13(1), pp.100-108.
  32. Samara, G. and Blaou, K.M., 2017, May. Wireless sensor networks hierarchical protocols. In 2017 8th International Conference on Information Technology (ICIT) (pp. 998-1001). IEEE.
  33. Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F. and Standaert, F.X., 2012, July. Compact implementation and performance evaluation of block ciphers in ATtiny devices. In International Conference on Cryptology in Africa (pp. 172-187). Springer, Berlin, Heidelberg.
  34. Samara, G., Ramadas, S. and Al-Salihy, W.A.. 2010. Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1.
  35. Samara, G., Abu Salem, A.O. and Alhmiedat, T., 2013. Dynamic Safety Message Power Control in VANET Using PSO. World of Computer Science & Information Technology Journal, 3(10).
  36. Goyal, T.K. and Sahula, V., 2016, September. Lightweight security algorithm for low power IoT devices. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1725-1729). IEEE.
  37. Naru, E.R., Saini, H. and Sharma, M., 2017, February. A recent review on lightweight cryptography in IoT. In 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC) (pp. 887-890). IEEE.
  38. Samara, G., 2020, November. Wireless Sensor Network MAC Energy- efficiency Protocols: A Survey. In 2020 21st International Arab Conference on Information Technology (ACIT) (pp. 1-5). IEEE.
  39. Pawar, A.B. and Ghumbre, S., 2016, December. A survey on IoT applications, security challenges and counter measures. In 2016 International Conference on Computing, Analytics and Security Trends (CAST) (pp. 294-299). IEEE.
  40. Usman, M., Ahmed, I., Imran, M., Khan, S. and Ali, U., 2017. SIT: A Lightweight Encryption Algorithm for Secure Internet of Things. International Journal of Advanced Computer Science and Applications, 8(1).
  41. Wang, Z., Yao, Y., Tong, X., Luo, Q. and Chen, X., 2019. Dynamically reconfigurable encryption and decryption system design for the internet of things information security. Sensors, 19(1), p.143.
  42. Misra, S., Maheswaran, M. and Hashmi, S., 2017. Security challenges and approaches in internet of things. Cham: Springer International Publishing.
  43. Samara, G., Albesani, G., Alauthman, M., Al Khaldy, M., Energy- efficiency routing algorithms in wireless sensor networks: A survey, International Journal of Scientific and Technology Research, 2020, 9(1), pp. 4415-4418.
  44. Domingo, M.C., 2012. An overview of the Internet of Things for people with disabilities. journal of Network and Computer Applications, 35(2), pp.584-596.
  45. Samara, G. and Aljaidi, M., 2018. Aware-routing protocol using best first search algorithm in wireless sensor. Int. Arab J. Inf. Technol., 15(3A), pp.592-598.
  46. Karakostas, B., 2013. A DNS architecture for the internet of things: A case study in transport logistics. Procedia Computer Science, 19, pp.594-601.
  47. Vyakaranal, S. and Kengond, S., 2018, April. Performance analysis of symmetric key cryptographic algorithms. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 0411-0415). IEEE.
  48. Samara, G., Al-Okour, M. 2020. Optimal number of cluster heads in wireless sensors networks based on LEACH, International Journal of Advanced Trends in Computer Science and Engineering, , 9(1), pp. 891-895.
  49. Li, S., Tryfonas, T. and Li, H., 2016. The Internet of Things: a security point of view. Internet Research.
  50. Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January. Security in internet of things: Challenges, solutions and future directions. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5772-5781). IEEE.
  51. Safi, A., 2017. Improving the security of internet of things using encryption algorithms. International Journal of Computer and Information Engineering, 11(5), pp.558-561.
  52. Wu, H. ACORN: A Lightweight Authenticated Cipher (v3). 2016. Available online: https://competitions.cr.yp.to/round3/acornv3.pdf (accessed on 26 November 2021).
  53. Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Großschädl, J. and Biryukov, A., 2019. Triathlon of lightweight block ciphers for the internet of things. Journal of Cryptographic Engineering, 9(3), pp.283- 302.
  54. Saraiva, D.A., Leithardt, V.R.Q., de Paula, D., Sales Mendes, A., González, G.V. and Crocker, P., 2019. Prisec: Comparison of symmetric key algorithms for iot devices. Sensors, 19(19), p.4312.
  55. Khan, N., Sakib, N., Jerin, I., Quader, S. and Chakrabarty, A., 2017, December. Performance analysis of security algorithms for IoT devices. In 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC) (pp. 130-133). IEEE.
  56. Surendran, S., Nassef, A. and Beheshti, B.D., 2018, May. A survey of cryptographic algorithms for IoT devices. In 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1-8). IEEE.
  57. Khan, S., Ibrahim, M.S., Ebrahim, M. and Amjad, H., 2015. FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security, 7(12), pp.60-69.
  58. Yilmaz, B. and Özdemİr, S., 2018, May. Performance comparison of cryptographic algorithms in internet of things. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  59. Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F. and Standaert, F.X., 2012, July. Compact implementation and performance evaluation of block ciphers in ATtiny devices. In International Conference on Cryptology in Africa (pp. 172-187). Springer, Berlin, Heidelberg.
  60. Khan, S., Ebrahim, M. and Khan, K.A., 2015, February. Performance evaluation of secure force symmetric key algorithm. In Proc. Int. Multi-Topic Conf.(IMTIC), Pakistan (pp. 11-13).
  61. Ochôa, I.S., Leithardt, V.R., Zeferino, C.A. and Silva, J.S., 2018, November. Data Transmission Performance Analysis with Smart Grid Protocol and Cryptography Algorithms. In 2018 13th IEEE International Conference on Industry Applications (INDUSCON) (pp. 482-486). IEEE.
  62. Popov, A. Prohibiting RC4 Cipher Suites. Available online: https://tools.ietf.org/html/rfc7465 (accessed on 26 November 2021).
  63. Al Sibahee, M.A., Lu, S., Hussien, Z.A., Hussain, M.A., Mutlaq, K.A.A. and Abduljabbar, Z.A., 2017, April. The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN. In 2017 International Conference on Computing Intelligence and Information System (CIIS) (pp. 308-312). IEEE.
  64. Yang, Y., Zheng, X., Guo, W., Liu, X. and Chang, V., 2018. Privacy- preserving fusion of IoT and big data for e-health. Future Generation Computer Systems, 86, pp.1437-1455.