scholarly journals Adaptive Multi-Applications Cryptographic System

Author(s):  
Basil Al-Kasasbeh

Cryptography is the core method utilized to protect the communications between different applications, terminals, and agents distributed worldwide and connected via the internet. Yet, with the distribution of the low-energy and low-storage devices, in the Internet-of-Things (IoT), the cryptography protocols cannot be implemented because of the power constraints or because the implementation is beyond the time constraints that hindered their usability of these protocols in real-time critical applications. To solve this problem, an Adaptive Multi-Application Cryptography System is proposed in this paper. The proposed system consists of the requirements identifier and the implementer, implemented on the application and transportation layer. The requirement identifier examines the header of the data, determines the underlying application and its type. The requirements are then identified and encoded according to four options: high, moderate, low, and no security requirements. The inputs are processed, and ciphertext is produced based on the identified requirements and the suitable cryptography algorithm. The results showed that the proposed system reduces the delay by 97% relative to the utilized algorithms' upper-bound delay. Keywords: Cryptography, symmetric key encryption, block cipher, delay and performance, quantum computing.

Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2098 ◽  
Author(s):  
Rafael Martínez-Peláez ◽  
Homero Toral-Cruz ◽  
Jorge R. Parra-Michel ◽  
Vicente García ◽  
Luis J. Mena ◽  
...  

With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.


2017 ◽  
Vol 8 (4) ◽  
pp. 23-29
Author(s):  
Rajaguru D. ◽  
Puviyarasi T. ◽  
Vengattaraman T.

The Internet of Things(IoT) such as the use of robots, sensors, actuators, electronic signalization and a variety of other internet-enabled physical devices may provide for new advanced smart applications to be used in construction in the very near future. Such applications require real-time responses and are therefore time-critical. Therefore, in order to support collaboration, control, monitoring, supply management, safety and other construction processes, they have to meet dependability requirements, including requirements for high Quality of Service (QoS). Dependability and high QoS can be achieved by using adequate number and quality of computing resources, such as processing, memory and networking elements, geographically close to the smart environments for handheld device computing (HDC).


Author(s):  
Orestis Mavropoulos ◽  
Haralambos Mouratidis ◽  
Andrew Fish ◽  
Emmanouil Panaousis ◽  
Christos Kalloniatis

Sign in / Sign up

Export Citation Format

Share Document