Implementation of AES algorithm to secure data in smart devices

2020 ◽  
Author(s):  
S. Aruna ◽  
K. Meenakshi
2017 ◽  
Vol 7 (4) ◽  
pp. 1781-1785
Author(s):  
E. S. I. Harba

Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. In order to avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yi Huang ◽  
Shah Nazir ◽  
Xinqiang Ma ◽  
Shiming Kong ◽  
Youyuan Liu

Billions of devices are connected via the Internet which has produced various challenges and opportunities. The increase in the number of devices connected to the Internet of things (IoT) is nearly beyond imagination. These devices are communicating with each other and facilitating human life. The connection of these devices has provided opening directions for the smart applications which are one of the growing areas of research. Among these opportunities, security and privacy are considered to be one of the major issues for researchers to tackle. Proper security measures can prevent attackers from interrupting the security of IoT network inside the smart city for secure data traffic. Keeping in view the security consideration of data traffic for smart devices and IoT, the proposed study presented machine learning algorithms for securing the data traffic based on a firewall for smart devices and IoT network. The study has used the dataset of “Firewall” for validation purposes. The experimental results of the approach show that the hybrid deep learning model (based on convolution neural network and support vector machine) outperforms than decision1 rules and random forest by generating a recognition rate of 95.5% for the hybrid model, 68.5% for decision rules, and 78.3% accuracy for random forest. The validity of the proposed model is also tested based on other performance metrics such as f score, error rate, recall, and precision. This high accuracy rate and other performance values show the applicability of the proposed hybrid model to secure data traffic purposes in smart devices. This can be used in many research areas of the smart city for security purposes.


With the large spread of wrist worn smart devices in day-to-day lives, an extensive series of applications are enabled. Securing message conversation between these devices has become a challenging issue, considering the high security necessities and low computation abilities of these wrist worn devices. In this paper, we propose a secure wrist worn smart device coupling arrangement by manipulating the wave indication of the strategies generated by the handshake to barter a trustworthy key between users. To guarantee the safety of key negotiation, a hybrid secured algorithm is further developed. On Comparing with existing algorithms, the planned algorithm evades complicated fault alteration algorithms. In existing work the key generation is small in size so it is easy to detect by the intruder, in order to overcome this issue the RSA algorithm is combined with the AES algorithm, So that the size of the key is increased due to the combined algorithm and therefore robustness of the key is increased compared to the existing method. Investigational results are provided, which prove that the proposed handshake acceleration-based coupling arrangement is strong, safe, and effectual.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Virdyra Tasril

The development of computer and telecommunications technology has experienced the significant change inprogress. It can be seen that technology has become a necessity because technological advances can accomplishtasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasinglychanges the way people communicate. There needs to be security protection to protect data from the threat ofwild parties. Cryptography is the right method to secure data. One method that can be used is the AdvancedEncryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used toidentify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly.Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing theciphertext data into the original form that we know as plaintext. The AES algorithm has several key modelssuch as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bitkey. AES encryption results can be trusted as one of the fast and powerful encryption methods.


Author(s):  
Rashmi K ◽  
H. P. Mohan Kumar

Sharing Data in cloud allows multiple participants to share the group of data we are gifting a distinctive block design-based key agreement protocol that supports multiple participants, in whatever the way to make the protection of the data more secure while sharing between two users. Secure data sharing is performed using a private key generated and transmitted using secure channels. A key agreement protocol is used for data transfer to make more protection compare to later communication and this protocol is applied in cloud computing to support secure and economical sharing. In addition, an AES algorithm is used to encrypt the data. We have a susceptibility to estimate Block design key for secure data sharing in cloud, based on key agreement protocol with in which TPA verifies the malicious user from the group. To protect the data more secure every time when user as to download the data the TPA generates key to user. Every time the key is generated as, an OTP to secure the data from the attacker the user must use the same key to decrypt the data. In addition to that, the owner file is also generated to user. TPA acknowledge malignant client from group and detract from group we have a tendency to blessing general recipes for creating the normal meeting key for numerous members.


Author(s):  
Manbir Sandhu ◽  
Purnima, Anuradha Saini

Big data is a fast-growing technology that has the scope to mine huge amount of data to be used in various analytic applications. With large amount of data streaming in from a myriad of sources: social media, online transactions and ubiquity of smart devices, Big Data is practically garnering attention across all stakeholders from academics, banking, government, heath care, manufacturing and retail. Big Data refers to an enormous amount of data generated from disparate sources along with data analytic techniques to examine this voluminous data for predictive trends and patterns, to exploit new growth opportunities, to gain insight, to make informed decisions and optimize processes. Data-driven decision making is the essence of business establishments. The explosive growth of data is steering the business units to tap the potential of Big Data to achieve fueling growth and to achieve a cutting edge over their competitors. The overwhelming generation of data brings with it, its share of concerns. This paper discusses the concept of Big Data, its characteristics, the tools and techniques deployed by organizations to harness the power of Big Data and the daunting issues that hinder the adoption of Business Intelligence in Big Data strategies in organizations.


2012 ◽  
Vol 2 (10) ◽  
pp. 1-4
Author(s):  
Raj Koti D Raj Koti D ◽  
◽  
Manoj Varma P Manoj Varma P
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document