Security Solution for the Internet of Things with the Innovative Lightweight Encryption Algorithm CurveCP

Author(s):  
Nguyen Van Tanh ◽  
Ngo Quang Tri ◽  
Nguyen Linh Giang ◽  
Duy-Tien Le
2018 ◽  
Vol 7 (6) ◽  
pp. 31-37 ◽  
Author(s):  
Muhammad Asif Habib ◽  
Mudassar Ahmad ◽  
Sohail Jabbar ◽  
Syed Hassan Ahmed ◽  
Joel J.P.C. Rodrigues

Author(s):  
Norliza Katuk ◽  
Ikenna Rene Chiadighikaobi

Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many zero blocks that lead to a pattern and make it easier for attackers to obtain an encryption key. Thus, this research proposed header and zero blocks bypass method during the block pre-processing to overcome this problem. First, the original PRESENT algorithm was enhanced by incorporating the block pre-processing phase. Then, the algorithm’s performance was tested using three measures: time, memory usage, and CPU usage for encrypting and decrypting fingerprint templates. This study demonstrated that the proposed method encrypted and decrypted the fingerprint templates faster with the same CPU usage of the original algorithm but consumed higher memory. Thus, it has the potential to be used in IoT environments for security.


Author(s):  
Yi Guo ◽  
Jianfang Yang ◽  
Baolong Liu

AbstractIn the development of the Internet of Things technology, RFID technology plays a very important role in the application of the Internet of Things. However, due to the safety problems caused by the non-contact sensing of the RFID system, the further development of RFID technology in the application is largely hindered. In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability, and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012019
Author(s):  
Ang Zhou

Abstract Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, transportation and other fields. While enjoying the convenient business of the, people also pay more attention to the security of the Internet of Things information system. Therefore, this article mainly discusses security under the perspective of the IoT, and understands the relevant basic theoretical knowledge about the IoT and security on the basis of a large number of documents, and then conceives the security methods under the perspective of the IoT, and the designed method has been tested, and the test results show that the performance of the encryption algorithm in the network security scheme of this article is due to the traditional encryption algorithm. When the encrypted text is 15000 bytes, the encryption time is 40s.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Sign in / Sign up

Export Citation Format

Share Document