SECURE AND HIGH-SPEED CRYPTOGRAPHY ARCHITECTURAL DESIGN TECHNIQUES FOR INTERNET OF THINGS

Authors

  • N J Krishnakumar
  • N Saravanan

Keywords:

Internet of Things (IoT), Perceptual layer, Cryptography of Elliptical Curve (ECC), Digital Signature Algorithm (EDSA), Keecak, Secured Hash Algorithm (SHA).

Abstract

Providing protection for the exchanged statistics performs a key role inside the modern-day world unsecured contact among IoT devices. As the technology develop giant portions of information are being exchanged, call for secure standards of encryption is as a result increasing. Security is more desirable so that in the center of the facts attack with the aid of intruders it isn't always possible for the guys to be inside the conversation link. The protection method was carried out the use of the principle of symmetric, asymmetric, and hash algorithms. Elliptic Curve Cryptography is accomplished to encrypt and share the secret AES key among sender and receiver, As well because the Sophisticated Encryption Method for the encryption / decryption of the receiving data. In this paper, especially green architectures are carried out to ensure statistics conversation among users in the IoT perceptual layer via related to initialization, authentication technique and key generation, other than encryption. Sender combines facts encryption and key encryption earlier than it is despatched to the receiver with signature schemes. The receiver verifies the signature and decryption of the key applied to realize original statistics transmitted among the Perceptual Layer devices within the Internet of Things.

Downloads

Download data is not yet available.

References

D. Gubbi, Buyya R., Marusic S., M. Palaniswami, "The Internet of Things (IOT): A Vision, Architectural Elements, and Future Directions," Computer Systems for Future Generation, vol. 29, pages 1645-1660, 2013. DOI: 10.1016 / d.forward.2013.01.010.

A. Vermesan, P. Friess, "The Internet of Things From Science and Invention to Business Launch," Communications sequence River Publishers, Aalborg, pp. 8- 15, 2014.

In C. Bormann, Ersue, & A. Keranen, "Constrained-Node Network Terminology," RFC 7228 (Informational), Task Force for Internet Engineering,

May 2014. [Translated]. Displayed at: http:/www.ietf.org/rfc/rfc7228.txt

Amruta R. Dumane, N. G. Narole, Prashant Wanjari, "Advanced Soft-Core Processor Encryption Standard Design," 2016 World Conference on Futuristic Trends in Social Welfare Research and Innovation, pp. 1-5, 2016.

VandanPendli, MokshithaPathuri, SubhakarYandrathi, Abdul Razaque, "Advanced Standard Encryption Algorithm Improvising Performance," Second International Mobile and Secure Services Conference (MobiSecServ) 2016, pp. 1- 5, 2016.

Daniel F. García, "Advanced Norm Encryption Algorithm Efficiency Assessment," Second International Conference on Mathematics and Computers in Science and Industry (MCSI), 2015, pp: 247-252, 2015.

A. Menezes, S. Vanstone, Journal of Cryptography 6 (4), pp. 209-224,1993, "Elliptic curve cryptosystem and their implementation."

H. Kurt, T. Yerlikaya, "A New Modified Cryptosystem Based on Menezes Vanstone Elliptic Curve Cryptography Algorithm Using the Hexadecimal Values of Characters," TAEECE 2013, Konya 2013, Turkey 2013

M. KURT, N. DURU, "Encryption at Menezes Vanstone Elliptic Curve Cryptosystem with Changing Least Significant Bit," pp. 1-3, 2014.

Geetha G and Padmaja Jain, "Matrix Mapping Approach Utilizing Elliptic Curve Cryptography," International Journal of Information Engineering Science and Study Volume 3 — Issue 5, pp. 312 — 317, 2014.

In F. Amounas, E.H. El Kinani, 'An Effective Matrice-based Elliptic Curve Cryptography Protocol, International Journal of Computer Developments, Part 1,

Issue 9 (November2012) pp: 49-54, 2012

Wuqiong Pan; Fangyu Zheng; Yuan Zhao, "An Efficient Elliptic Curve Signature Server With GPU Acceleration," IEEE Information Forensics and Security Transactions, pp:111-122, 2017.

Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo, "Elliptic Curve Cryptography 's Secure Anonymous Authentication Protocol," Volume: 4, IEEE Access 2016, pp: 4394-4407, 2016.

Baldwin, y. Al., "Round Two SHA-3 Candidates FPGA Implementations," 2nd SHA-3 Candidate Conf., 2010.

And E. Homesirikamol, and. CHES2011, LNCS 6917, pp. 491-506, 2011. Al., "Throughput vs. Region Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates implemented using Xilinx and Altera FPGAs."

Sudha Ellison Mathe; Lakshmi Boppana; Ravi Kishore Kodali Implementation of Elliptic Curve Digital Signature Algorithm to an IRIS mote using SHA-512 International Conference on Industrial Instrumentation and Control (ICIC), pp. 445-449, 2015.

AbdessalemAbidi; BelgacemBouallegue; Fatma Kahri Introduction of the Digital Signature Curve (ECDSA) Global Computing & Information Technology Summit (GSCIT) pp. 1-6, 2014.

Downloads

Published

2021-06-30

How to Cite

Krishnakumar, N. J. . ., & Saravanan, N. . (2021). SECURE AND HIGH-SPEED CRYPTOGRAPHY ARCHITECTURAL DESIGN TECHNIQUES FOR INTERNET OF THINGS. The Journal of Contemporary Issues in Business and Government, 27(3), 1795–1808. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/1789