scholarly journals Physical layer secret-key generation with discreet cosine transform for the Internet of Things

Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  
2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

The Internet of Things (IoT) being a promising innovation of things to come and is required to associate billions of gadgets. Web of things (IoT) gadgets have been generally utilized, and Electronic correspondence is expanded quickly. The expanded number of correspondence is required to create piles of information and the security of information can be a danger. Information gathered by the IoT gadgets and the information which IoT gadget send might be the portal for an assailant to break client security. To guarantee secure correspondence between IoT centers and central point(server), a cryptographic plan for lightweight gadgets is proposed. In this plan, we make utilize pseudo stream cipher with key generation for rearranging key synchronization and improving security.. The common verification, secret key for meeting synchronization and refreshing secret key for session are finished by trading scrambled messages. Likewise, the key length and update cycle for mystery key for meeting are adaptable as indicated by application. Keys are created from mystery key for meeting for improving the security. We contrasted the plan's security and execution and some lightweight plans. As indicated by the investigation, the proposed plan can give greater security includes low overhead of correspondence which is correct for IoT Node with restricted resource and power. Encryption and decoding is finished utilizing trigonometric ideas and by utilizing the idea of stream figure. Trigonometric ideas are lightweight and improve the security up by an extraordinary degree by diminishing the odds of cryptanalysis. When contrasted with different calculations like Hill figure, RC4, RSA and Present(Lightweight square figure) and so forth, the proposed calculation gives better execution.


2019 ◽  
Vol 26 (5) ◽  
pp. 92-98 ◽  
Author(s):  
Junqing Zhang ◽  
Sekhar Rajendran ◽  
Zhi Sun ◽  
Roger Woods ◽  
Lajos Hanzo

Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2013 ◽  
Vol 21 (20) ◽  
pp. 23756 ◽  
Author(s):  
Konstantin Kravtsov ◽  
Zhenxing Wang ◽  
Wade Trappe ◽  
Paul R. Prucnal

Sign in / Sign up

Export Citation Format

Share Document