scholarly journals Cryptographic Scheme for Lightweight Device Such as IoT using Pseudo Stream Cipher and Trigonometric Technique with Key Generation

The Internet of Things (IoT) being a promising innovation of things to come and is required to associate billions of gadgets. Web of things (IoT) gadgets have been generally utilized, and Electronic correspondence is expanded quickly. The expanded number of correspondence is required to create piles of information and the security of information can be a danger. Information gathered by the IoT gadgets and the information which IoT gadget send might be the portal for an assailant to break client security. To guarantee secure correspondence between IoT centers and central point(server), a cryptographic plan for lightweight gadgets is proposed. In this plan, we make utilize pseudo stream cipher with key generation for rearranging key synchronization and improving security.. The common verification, secret key for meeting synchronization and refreshing secret key for session are finished by trading scrambled messages. Likewise, the key length and update cycle for mystery key for meeting are adaptable as indicated by application. Keys are created from mystery key for meeting for improving the security. We contrasted the plan's security and execution and some lightweight plans. As indicated by the investigation, the proposed plan can give greater security includes low overhead of correspondence which is correct for IoT Node with restricted resource and power. Encryption and decoding is finished utilizing trigonometric ideas and by utilizing the idea of stream figure. Trigonometric ideas are lightweight and improve the security up by an extraordinary degree by diminishing the odds of cryptanalysis. When contrasted with different calculations like Hill figure, RC4, RSA and Present(Lightweight square figure) and so forth, the proposed calculation gives better execution.

2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


Throughout this book, the authors have discussed the implications of the rise of artificial intelligence, Industry 4.0, the internet of things, and new business models that do not have any known precedents. While discussing the skills needed to survive in the modern economy, they have yet to address the issue of what will become of our jobs. Will our children dream of the same jobs we dreamed once before? Will they require the same studies we had to follow to reach our actual positions? Will our jobs still exist by the time we reach the pension, or will we need to reinvent everything that we know of? The authors do not have an answer to these questions; what they can do is only make educated guesses about what is about to come and be ready for it. In this last chapter, the authors see what experts think our future will look like and give their educated opinion in what to invest in our lifelong learning journey to be on top of this unprecedented disruption of the economy.


2021 ◽  
Vol 5 (3) ◽  
pp. 483-488
Author(s):  
Cinantya Paramita ◽  
Usman Sudibyo

Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.  


2013 ◽  
Vol 411-414 ◽  
pp. 141-144
Author(s):  
Jun Zhou ◽  
Zhen Yu Yang

The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect directly to the base station node. Only through collect more than threshold number of multi-secret that can decrypt the communication data between the base station and the remote node. To be safer, we used digital watermarking technology to protect the data transmission between the base station and the aggregate node. These techniques combined with the data slice, homomorphism encryption technology to protect data privacy, construct a safe and efficient wireless sensor networks.


Author(s):  
Chandrasekar Ravi ◽  
Praveensankar Manimaran

Since the advent of the web, the number of users who started using the internet for everyday purpose has increased tremendously. Most of the common purposes are to access their data whenever they want and wherever they want. So many companies have started providing these services to normal users. These companies store huge volume of data in the data centers. So protecting the integrity of the data is the main responsibility of these companies. Blockchain is one of the trending solutions that gives storage immutability to the users. This chapter starts with the working of blockchain and smart contracts and advantages and disadvantages of blockchain and smart contracts and then goes on to explain how blockchain can be integrated into the internet of things (IOT). This chapter ends with an architecture based on the proof-of-concept for access management, which is blockchain-based fully distributed architecture.


Sign in / Sign up

Export Citation Format

Share Document