scholarly journals LORENA: Low memORy symmEtric-key geNerAtion method for based on group cryptography protocol applied to the Internet of Healthcare Things

IEEE Access ◽  
2022 ◽  
pp. 1-1
Author(s):  
Kristtopher Kayo Coelho ◽  
Michele Nogueira ◽  
Mateus Coutinho Marim ◽  
Edelberto Franco Silva ◽  
Alex Borges Vieira ◽  
...  
2019 ◽  
Vol 6 (3) ◽  
pp. 4049-4062 ◽  
Author(s):  
Md. Asif-Ur-Rahman ◽  
Fariha Afsana ◽  
Mufti Mahmud ◽  
M. Shamim Kaiser ◽  
Muhammad R. Ahmed ◽  
...  

2017 ◽  
Vol 6 (3) ◽  
pp. 219-227
Author(s):  
Edwin R. Arboleda ◽  
Joel L. Balaba ◽  
John Carlo L. Espineli

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.


2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Jaehyu Kim ◽  
JooSeok Song

With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN) technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa) is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN) is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.


2018 ◽  
Vol 44 (2) ◽  
pp. 35-40
Author(s):  
Tanya jabor ◽  
Hiba Taresh ◽  
Alaa Raheema

All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.


MATEMATIKA ◽  
2019 ◽  
Vol 35 (1) ◽  
pp. 1-11 ◽  
Author(s):  
Manoj Kumar ◽  
Pratik Gupta

Signcryption schemes are compact and specially suited for efficiency-critical applications such as smart card dependent systems. Several researchers have performed a large number of significant applications of signcryption such as authenticated key recovery and key establishment in one mall data packet, secure ATM networks as well as light weight electronic transaction protocols and multi-casting over the internet. In this paper we have proposed an efficient and efficient scheme of signcryption symmetric key solutions, using elliptic curves by reducing senders computational cost. It needs two elliptic curve point multiplication for sender and comparative study of computational cost for sender and recipient as well as there is no any inverse computation for sender and recipient. This makes it more crucial than others.


The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. It is commonly applied in many applications, like building automation, medical healthcare systems, transportation, environment monitoring, and energy management. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. However, the privacy of data seems to be the greatest issue that needs to be solved. This paper intends to develop an improved data sanitization and restoration framework in IoT for higher-order privacy preservation. The preservation process is carried out using key that is optimally selected. For the optimal selection of key, a new Improved Dragonfly Algorithm (IDA) is introduced. Finally, the algorithmic analysis is carried out by varying parameters like enemy distraction weight e and food attraction weight f  of the proposed algorithm


Sign in / Sign up

Export Citation Format

Share Document