SECURE AND HIGH-SPEED CRYPTOGRAPHY ARCHITECTURAL DESIGN TECHNIQUES FOR INTERNET OF THINGS
Keywords:
Internet of Things (IoT), Perceptual layer, Cryptography of Elliptical Curve (ECC), Digital Signature Algorithm (EDSA), Keecak, Secured Hash Algorithm (SHA).Abstract
Providing protection for the exchanged statistics performs a key role inside the modern-day world unsecured contact among IoT devices. As the technology develop giant portions of information are being exchanged, call for secure standards of encryption is as a result increasing. Security is more desirable so that in the center of the facts attack with the aid of intruders it isn't always possible for the guys to be inside the conversation link. The protection method was carried out the use of the principle of symmetric, asymmetric, and hash algorithms. Elliptic Curve Cryptography is accomplished to encrypt and share the secret AES key among sender and receiver, As well because the Sophisticated Encryption Method for the encryption / decryption of the receiving data. In this paper, especially green architectures are carried out to ensure statistics conversation among users in the IoT perceptual layer via related to initialization, authentication technique and key generation, other than encryption. Sender combines facts encryption and key encryption earlier than it is despatched to the receiver with signature schemes. The receiver verifies the signature and decryption of the key applied to realize original statistics transmitted among the Perceptual Layer devices within the Internet of Things.
Downloads
References
D. Gubbi, Buyya R., Marusic S., M. Palaniswami, "The Internet of Things (IOT): A Vision, Architectural Elements, and Future Directions," Computer Systems for Future Generation, vol. 29, pages 1645-1660, 2013. DOI: 10.1016 / d.forward.2013.01.010.
A. Vermesan, P. Friess, "The Internet of Things From Science and Invention to Business Launch," Communications sequence River Publishers, Aalborg, pp. 8- 15, 2014.
In C. Bormann, Ersue, & A. Keranen, "Constrained-Node Network Terminology," RFC 7228 (Informational), Task Force for Internet Engineering,
May 2014. [Translated]. Displayed at: http:/www.ietf.org/rfc/rfc7228.txt
Amruta R. Dumane, N. G. Narole, Prashant Wanjari, "Advanced Soft-Core Processor Encryption Standard Design," 2016 World Conference on Futuristic Trends in Social Welfare Research and Innovation, pp. 1-5, 2016.
VandanPendli, MokshithaPathuri, SubhakarYandrathi, Abdul Razaque, "Advanced Standard Encryption Algorithm Improvising Performance," Second International Mobile and Secure Services Conference (MobiSecServ) 2016, pp. 1- 5, 2016.
Daniel F. García, "Advanced Norm Encryption Algorithm Efficiency Assessment," Second International Conference on Mathematics and Computers in Science and Industry (MCSI), 2015, pp: 247-252, 2015.
A. Menezes, S. Vanstone, Journal of Cryptography 6 (4), pp. 209-224,1993, "Elliptic curve cryptosystem and their implementation."
H. Kurt, T. Yerlikaya, "A New Modified Cryptosystem Based on Menezes Vanstone Elliptic Curve Cryptography Algorithm Using the Hexadecimal Values of Characters," TAEECE 2013, Konya 2013, Turkey 2013
M. KURT, N. DURU, "Encryption at Menezes Vanstone Elliptic Curve Cryptosystem with Changing Least Significant Bit," pp. 1-3, 2014.
Geetha G and Padmaja Jain, "Matrix Mapping Approach Utilizing Elliptic Curve Cryptography," International Journal of Information Engineering Science and Study Volume 3 — Issue 5, pp. 312 — 317, 2014.
In F. Amounas, E.H. El Kinani, 'An Effective Matrice-based Elliptic Curve Cryptography Protocol, International Journal of Computer Developments, Part 1,
Issue 9 (November2012) pp: 49-54, 2012
Wuqiong Pan; Fangyu Zheng; Yuan Zhao, "An Efficient Elliptic Curve Signature Server With GPU Acceleration," IEEE Information Forensics and Security Transactions, pp:111-122, 2017.
Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo, "Elliptic Curve Cryptography 's Secure Anonymous Authentication Protocol," Volume: 4, IEEE Access 2016, pp: 4394-4407, 2016.
Baldwin, y. Al., "Round Two SHA-3 Candidates FPGA Implementations," 2nd SHA-3 Candidate Conf., 2010.
And E. Homesirikamol, and. CHES2011, LNCS 6917, pp. 491-506, 2011. Al., "Throughput vs. Region Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates implemented using Xilinx and Altera FPGAs."
Sudha Ellison Mathe; Lakshmi Boppana; Ravi Kishore Kodali Implementation of Elliptic Curve Digital Signature Algorithm to an IRIS mote using SHA-512 International Conference on Industrial Instrumentation and Control (ICIC), pp. 445-449, 2015.
AbdessalemAbidi; BelgacemBouallegue; Fatma Kahri Introduction of the Digital Signature Curve (ECDSA) Global Computing & Information Technology Summit (GSCIT) pp. 1-6, 2014.
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.