Enhancing the Security System using Cryptography for IoT Based Devices

Authors

  • Sheenu Sachdeva  Assistant Professor, Department of CSE, JCDM College of Engnierring, Sirsa, Haryana, India
  • Aruna  M.Tech. Scholar, Department of CSE, JCDM College of Engnierring, Sirsa, Haryana, India

Keywords:

IoT, Data Security, AES, MIE Encryption Algorithm.

Abstract

Internet of things (IOT) are becoming popular and taking an important place in our daily routine life. IOT based devices are making our life easy and comfortable. Although IoT explosion offers a wide range of opportunities for manufacturers and consumers, it also poses major risks in terms of security being a widespread network. A security mechanism is needed to protect the devices from cyber attacks. This can only be achieved by including security mechanism in the early stages of IoT based device’s design to observe privacy and safe transmission of data over network. In existing system, standard protocols were used for data transmission and basic encryption techniques were being applied for ensuring the security of IoT based devices. But it failed in preventing against routing attacks and packet losses in transmission. To overcome these problems, a two tier security model has been proposed in present study. Therefore, this paper proposes a two tier security model for IoT based devices. In this approach the advanced encryption standard (AES) are used with multiplicative inverse encryption algorithm (MIE) to ensure the security of data. A comparative analysis between proposed model and existing model has been performed in the present study. The parameters packet size, transmission time and error rate has been determined in the comparison.

References

  1. Vithya Vijaylakshmi, “Enhancing the security of IoT Data using Multilevel Encryption (2017)”
  2. B.S Kumar and T.C.S.P Raju “Introduced the Intrusion Detection System- Their Types and Prevention (2013).
  3. Trivedi,”Cryptographic Approach for Securing IoT Device” (2018)
  4. Vinay Sagar and Kusuma S.M,”Home Automation using Internet of things” (2015)
  5. Cryptography- Wikipedia, en.wikipdedia.org/wiki/cryptograph.
  6. Mahalakshmi et.al,"Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm," (2019).
  7. Ge Wu and Willy, “Generalized public-key cryptography with tight security” (2019) Y. Yusfrizal and F. Agustin, "Key Management Using Combination of Diffie–Hellman Key Exchange with AES Encryption," 2018 6th International Conference on Cyber and IT Service Management (CITSM), Parapet, Indonesia, 2018, pp. 1-6.
  8. Marek R.Ogiela et al.”Cognitive solutions for security and cryptography” (2019)
  9. Xiangyu Chang and Z.Zhang, ”Cipher text-only attack on optical scanning cryptography” (2019)
  10. IroshaJayatilleka and Malka N. Halgamuge “Internet of Things in healthcare: Smart devices, sensors, and system related to diseases and health conditions” (2019).
  11. Z. Zhang et.al, "Summary of research on IT network and Industrial Control network Security assessment”, (2019).
  12. S. E. Tuiri, N. Sabil, C. A. Kerrache and G. Koziel, "An EEG Based Key Generation Cryptosystem using Diffie-Hellman And AES," 2018 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), Manama, Bahrain, 2018, pp. 1-6.
  13. Diego Mendez, IoannisPapapanagiotou, Baijian Yang “Internet of Things: Survey on Security and Privacy” (2017) IOT SECURITY.
  14. H. Bodur and R. Kara, "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission," (2017) 9th International Conference on Computational Intelligence and Communication Networks (CICN)

Downloads

Published

2021-10-30

Issue

Section

Research Articles

How to Cite

[1]
Sheenu Sachdeva, Aruna, " Enhancing the Security System using Cryptography for IoT Based Devices, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 5, pp.227-232, September-October-2021.