LEOBAT : Lightweight encryption and OTP based authentication technique for securing IoT networks

2021 ◽  
Author(s):  
Aarti Goel ◽  
Deepak Kumar Sharma ◽  
Koyel Datta Gupta
Author(s):  
Pengfei Qiu ◽  
Yongqiang Lyu ◽  
Jiliang Zhang ◽  
Dongsheng Wang ◽  
Gang Qu

2021 ◽  
Vol 17 (1) ◽  
pp. 260-264
Author(s):  
Alexandru VULPE ◽  
Raluca ANDREI ◽  
Alexandru BRUMARU ◽  
Octavian FRATU

Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).


2017 ◽  
Vol 7 (1.2) ◽  
pp. 9 ◽  
Author(s):  
Shwetambari Kharabe ◽  
C. Nalini

Exploding growth in the field of electronic information technology, the finger vein authentication technique plays a vibrant role for personal identification and verification. In recent era, this technique is gaining popularity, as it provides a high security and convenience approach for personal authentication. Vein biometrics is an emerging methodologycomparing to other systems, due to its strengths of low forgery risk, aliveness detection and stableness over long period of time. Literatures published based on different techniques used forand authentication process are described and evaluated in this paper. These processes hadgained an outstanding promise in variety of applications and much attention among researchers to provide combine accuracy, universality and cost efficiency. This paper in brief, reviews various approaches used for finger vein segmentation and feature extraction. The reviews are based on finger vein basic principles, image acquisition methodology, pre-processing functions, segmentation, feature extraction,classification, matching and identification procedures, which are analyzed scientifically, thoroughly and comprehensively.Based on the analysis, the ideal process and procedure is identified, which will be an idyllic solution for finger vein authentication.


Although the IoT opens the door to endless possibilities, but it is also associated with many risks because all devices connected to the internet involve the use of data points. Therefore, it is essential to ensure IoT security and privacy. A review of existing research works highlights the usage of traditional security scheme based on cryptography for data transmission among IoT nodes and gateways. The proposed system proposes an integrated model that combines lightweight encryption technique with robust and cost-efficient authentication mechanism. The proposed system introduces digital signature-based authentication and complexity minimization in order to resist the involvement of any kind of unknown attacks. The simulation outcome of this model exhibits reliable security, faster response times and energy savings for IoT nodes.


Author(s):  
Abinaya R

Password authentication is the most widely used authentication technique, for it is available at a low cost and easy to deploy. Many users usually set their passwords using familiar vocabulary for its convenience to remember. Passwords may be leaked from weak systems. Vulnerabilities are continuously being determined, and no longer all systems may be well timed patched to resist attacks, which give adversaries an opportunity to illegally access vulnerable systems. To overcome the vulnerabilities of password attacks, here propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-512). Then, the hashed password is randomly shuffled to get a negative password. Finally, the negative password is encrypted into an Encrypted Negative Password using a symmetric-key algorithm RC5, to further improve security. The proposed hash function and encryption methodologies make it difficult to break passwords from ENPs. This proposed ENP system will be implemented for banking environment to improve security of password storage and transaction details.


Sign in / Sign up

Export Citation Format

Share Document