Symmetric Data encryption using trusted third party Objects in IOT

  • Prof.Rohini S. Hanchate
  • Prof.Sarika Kadam
Keywords: IOT, security, encryption, decryption, mixed encryption.

Abstract

In modern period, the number of elegant things  are organized, typically referred to as “Internet of Things” (IoT) devices, is rapidly increasing due to almost infinite applications, which are rapidly getting part of the everyday life, such as wearable technologies, smart grid,  Smart Traffic Light System , smart cities,  smart transport etc..

In order to secure the communication between IoT devices and Internet servers, and guarantee to the customer’s on new emerging IoT technologies, efficient cryptographic mechanism is necessary. To achieve integrity and legitimacy there must be Authenticated Encryption (AE) algorithms applied to smart devices responsible for communication.

References

[1]. Lin, Jie, et al. "A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications." IEEE Internet of Things Journal (2017).
[2]. Talwana, Jonathan Charity, and Huang Jian Hua. "Smart World of Internet of Things (IoT) and Its Security Concerns." Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016 IEEE International Conference on. IEEE, 2016.
[3]. JunzuoLai,Deng R H,ChaowenGuan,JianWeng,Attribute-Based Encryption with Verifiable Outsourced Decryption, in IEEE Transactions on Information Forensics and Security, vol.8 (8), pages 1-7,2011
[4]. Usman, Muhammad, et al. "SIT: A Lightweight Encryption Algorithm for Secure Internet of Things." arXiv preprint arXiv:1704.08688 (2017).
[5]. Xin, Mingyuan. "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System." Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015 International Conference on. IEEE, 2015.
[6]. Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016, August). Internet of Things (IoT): Taxonomy of security attacks. In Electronic Design (ICED), 2016 3rd International Conference on (pp. 321-326). IEEE.
[7]. Zhou, Jun, et al. "Security and privacy for cloud-based IoT: challenges."IEEE Communications Magazine 55.1 (2017): 26-33.
[8]. Said, Omar. "Development of an innovative internet of things security system." Int. J. Comput. Sci. Issues (IJCSI) 10.6 (2013): 155-161.
[9]. Grabovica, Minela, et al. "Provided security measures of enabling technologies in Internet of Things (IoT): A survey." Zooming Innovation in Consumer Electronics International Conference (ZINC), 2016. IEEE, 2016.
[10]. Prakash, G. L., Manish Prateek, and Inder Singh. "Data encryption and decryption algorithms using key rotations for data security in cloud system." Signal Propagation and Computer Technology (ICSPCT), 2014 International Conference on. IEEE, 2014.
Published
2018-12-20
How to Cite
S. Hanchate, P., & Kadam, P. (2018). Symmetric Data encryption using trusted third party Objects in IOT. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 4(3). Retrieved from https://asianssr.org/index.php/ajct/article/view/804

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.