Improving The Security of Internet of Things Using Encryption Algorithms
Improving The Security of Internet of Things Using Encryption Algorithms
1
can play an effective role in reducing the security risks. This
Abstract—Internet of things (IOT) is a kind of advanced kind of encryption can be a public key cryptography where
information technology which has drawn societies’ attention. Sensors high speed in encryption security and less memory
and stimulators are usually recognized as smart devices of our requirement are its specifications [7], [8].
environment. Simultaneously, IOT security brings up new issues.
Internet connection and possibility of interaction with smart devices II. RELATED WORKS
cause those devices to involve more in human life. Therefore, safety
is a fundamental requirement in designing IOT. IOT has three In 2015 [9], a security model is presented based on SDN
Open Science Index, Computer and Information Engineering Vol:11, No:5, 2017 publications.waset.org/10007094/pdf
remarkable features: overall perception, reliable transmission, and architecture. In the suggested model, both substructures, wired
intelligent processing. Because of IOT span, security of conveying and wireless networks, have been used to provide safety. The
data is an essential factor for system security. Hybrid encryption proposed architecture is to create Ad-Hoc network and
technique is a new model that can be used in IOT. This type of
reticular objects such as sensors, tablet, smart phone, etc. One
encryption generates strong security and low computation. In this
paper, we have proposed a hybrid encryption algorithm which has of the important features of SDN architecture is its ability to
been conducted in order to reduce safety risks and enhancing extend their security area to access the network.
encryption's speed and less computational complexity. The purpose In 2015, authors [10] provided a hybrid algorithm which
of this hybrid algorithm is information integrity, confidentiality, non- has combined AES and ECC algorithms and has been applied
repudiation in data exchange for IOT. Eventually, the suggested in security of IOT.
encryption algorithm has been simulated by MATLAB software, and
In 2014 [11], a standard IP-based security framework has
its speed and safety efficiency were evaluated in comparison with
conventional encryption algorithm. been offered for security solution in order to optimize IOT.
This secure connection is based on the combination of end-to-
Keywords—Internet of things, security, hybrid algorithm, end connection and public key cryptography.
privacy. In 2014 [12], a method is presented to resolve security
challenges in IOT. In this method, first of all, the owner
I. INTRODUCTION exports token related issues to access to the devices and
I OT is a new network that is being used by wireless sensor connects to the token with oval ECDSA elliptically algorithm
connections and radio frequency identification (RFID) in order to prevent of exporter’s security flaws.
through wireless network and technology to achieve overall In 2013 [13], a security framework is provided for IOT by
perception of information, reliable transmission, and SM2 encryption algorithm and resolving security problems
intelligent processing. Hence, protecting privacy and safety between client and receptor in the information transmission
are the essential features of IOT [1]. This security is related to process. That algorithm is carried out by using a wide range of
tag information (RFID), wireless communications information IOT based on elliptically graph of ECC. This method is an
security, network transmission of information security, innovative way to research on the security of IOT.
privacy, and information processing security. Therefore, it is In 2013, authors [14] presented a systematic approach with
vital to have thorough study and research on design and four nodes containing individual node, process node,
improvement of security problems in IOT [2], [3]. IOT ecosystem technological node and smart thing node. In this
consists of three layers: sensing layer, transport layer and method, security process needs responding required standards,
application layer. IOT has created a huge change in the strategies, policies, trends, and other documentations.
medicine, household, business, industry, agriculture, and even In 2012 [15], according to the security challenge of IOT, a
nuclear reactors. The rapid development of security and security framework is presented based on 4G connection. This
privacy in large scale are the determinant factors of IOT. The framework enhances the communication speed of IOT.
main purpose of network security and information protection Through this method, 4G client can access to wireless network
is to achieve confidentiality and integrity. Security issues are resources.
of great importance in enlarging the scale of network and A suggested method [16] in 2011 is presented for safe
devices [4], [5]. embedded security framework in IOT. This security
There are some security risks in both consumers and framework is divided into hardware, software, and with highly
business in IOT, so data encryption can be used to reduce light weight protocols in MAC layer and physical layer.
security risks [6]. Providing a suitable encryption algorithm In 2014, authors [17] presented blowfish algorithm on
FPGA by the use of VHDL programming language which had
Amirhossein Safi is with the Department of Computer Engineering, Novin supervision on some of FPGA resources. Blowfish algorithm
Hi-Tech Solutions,Tehran, Iran (e-mail: [email protected]).
International Scholarly and Scientific Research & Innovation 11(5) 2017 558 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:11, No:5, 2017
has shown that it has good performance during the FPGA from the state matrix and a key from the key matrix randomly
implementation and also is a good alternative for network and produce public key of H by sender in XOR operation.
security in IOT.
In 2014 [18], Hash encryption is presented with the aim of Message Intern
increasing security that was focusing on a smart home. In fact, encryption by
the main purpose was security in IOT devices that can send asymmetric
algorithm
messages with more security.
Message decryption by
In 2013 [19], a system is proposed for IOT and security asymmetric algorithm
risks reduction in useful applications to equip management and private key
system which introduces a hybrid encryption algorithm based Use Private key is in recipient
on DES and DSA encryption algorithms. or in home tool
In 2013 [20], key technologies are presented with IOT such
as RFID technology, electronic technology code identification, Creating a public key by
and ZigBee technologies. In this regard, key technologies symmetric algorithm
framework and their usage in digital agriculture have been Sending the first message
analyzed.
Open Science Index, Computer and Information Engineering Vol:11, No:5, 2017 publications.waset.org/10007094/pdf
International Scholarly and Scientific Research & Innovation 11(5) 2017 559 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:11, No:5, 2017
2,5
algorithm per second
Period of time for
a b f message (7) 2
1,5
(8)
1
International Scholarly and Scientific Research & Innovation 11(5) 2017 560 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:11, No:5, 2017
1033, 2015.
digital signature in suggested
International Scholarly and Scientific Research & Innovation 11(5) 2017 561 ISNI:0000000091950263