Lightweight Encryption Algorithm for Secure Communication in IoT

Verified

Added on  2023/06/03

|1
|1217
|307
AI Summary
This presentation discusses the need for secure communication in IoT and the limitations of traditional encryption algorithms. It proposes a lightweight encryption algorithm for secure communication in IoT and explains its functionality. The presentation also covers the vulnerabilities in the IoT architecture and the security measures taken at different layers. The proposed algorithm works on quantization of the input speech given for securing the confidentiality of data and information in the IoT environment.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
www.postersession.com
www.postersession.com
Internet of thing is the emerging phenomenon in the digital world. It provides the
connectivity between digital tools and human interaction in the development of the
real time application. Security is the major concern with the IOT devices. The IOT
environment is composed of radio frequency Identifiers tags, sensors, actuators,
routers, smart devices, and human.
The RFID tags helps in managing the communication between the human and the
physical smart devices for initializing the flow of information for making efficient
real time communication between them. The IOT environment is composed of
three things which are classified as pinpointing things, computation things, and
interaction with the ubiquitous computer digital world (Hasan and Ismail, 2017).
The IOT architecture is composed of three layers which are physical layer,
commutation layer, and application layer. The connectivity between the physical
devices with the human is possible with the help of physical layer. The 4G
network is required for managing the interaction with the physical devices. The
public network is developed for increasing the efficiency of the IOT application.
Functionality
The IOT devices are equipped with some limitations such as these devices are
incorporated with resource constraints, having small memory sizes, limited
bandwidth, time dependent, use of radio frequency Identifiers, and others.
These limitation makes difficulty in managing effective security cryptographic
procedures for the IOT devices to make it secure from unauthorised modification,
un-authentication accessing of account, data leakages and misuses, monitoring
of data flow, and others (Katagi, and Moriai, 2011).
The vulnerabilities can be added by the hackers in the IOT environment which
can results into malfunctioning of the system. The best solution to resolve the
complexities of IOT devices in secure connection is the development of the
lightweight encryption algorithm (LEA).
Security in IOT
Architecture
Conclusions
Lightweight Encryption Algorithm
Bibliography
Physical Layer: The physical layer works on managing the integration of RFID
tags, actuators, sensors, data transmission, and others. The security of the
physical layer is done through the implementation of IEEE 802.15.4. It is used
for securing the vulnerabilities associated in the flow of data transmission at
physical layer (Batra, 2017).
Network Layer: The transmission of data packets from data link layer to
network layer can be done securely by IPv6 and IPv4 protocol. The network
layer in the IOT architecture is deployed with inbuilt security protocol named as
AES and DES.
Transport Layer: The user datagram protocol UDP is the used for managing
peer to peer communication between IOT devices.
Application layer: Constrained Application protocol is used for securing the
different application for the communication between IOT devices.
Katagi, M., and Moriai, S. (2011). Lightweight cryptography for the internet
of things. Ebook [Online]. Available at: https://iab.org/wp-content/IAB-
uploads/2011/03/Kaftan.pdf [Accessed on Sep 30, 2018]
Hasan, A., and Ismail, A. (2017). Evaluation of encryption algorithm for IOT
security. Ebook [Online]. Available at:
http://197.251.7.10:8080/xmlui/bitstream/handle/123456789/98/Evaluation
%20of%20encryption%20algorithms%20for%20IOT%20security.pdf?
sequence=1&isAllowed=y [Accessed on Sep 30, 2018]
Batra, I. (2017). Research and analysis of lightweight cryptographic solution
for internet of things. Ebook [Online]. Available at:
https://dl.acm.org/citation.cfm?id=2905229 [Accessed on Sep 30, 2018]
Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L. (2010). A
survey of lightweight cryptography implementation. Ebook [Online].
Available at:
https://www.emsec.rub.de/media/crypto/attachments/files/2010/04/lwc_surv
ey_ieee_dtco2007.pdf [Accessed on Sep 30, 2018]
Introduction
Algorithm
The lightweight algorithm are advantageous for measuring the
interaction and authentication between the devices at less power
consumption. It is practically applied to the RFID tag for managing
the security in the data transfer rate of the IOT devices (Eisenbarth,
Paar, Poschmann, Kumar, Uhsadel, 2010).
The passive RFID block cipher does not required any consumption
of the power supply. The electromagnetic signals are created for
sending the request and response among them. The active RFID
tags are depends on the electric signals only. The semi-passive
RFID tags are depends on battery for energy to manage
interconnection between the smart equipment.
It can be concluded that the confidentiality and sensitivity of the data is the
major requirement of the IOT environment for the secure transmission of
information between the participating units. The IOT devices are equipped
with some limitations such as these devices are incorporated with resource
constraints, having small memory sizes, limited bandwidth, time dependent,
use of radio frequency Identifiers, and others. The requirement of
confidentiality and accuracy in the information flow between the IOT
devices increases the risks and vulnerabilities attacks on the IOT
environment. The internet of things is equipped with several attacks for
hacking the information. The study of the literature review helps in
analysing the efficiency of the symmetric and public key infrastructure
protocol in the development of the secure IOT architecture. The
complexities of the traditional light weight algorithm can be analysed. The
development of the lightweight cryptographic architecture depends on four
major factors which are categorised as size of memory RAM and ROM,
power utilization for managing network connection, power consumed for
the implementation of lightweight cryptographic algorithm, and speed,
throughput, and delay in the processing time. The algorithm is designed for
resolving the issue of man in the middle attack problems associated with
the IOT communication between the smart devices. The hacker can sense
the flow of information for stealing the data from the path. The proposed
algorithm works on quantization of the input speech given for securing the
confidentiality of data and information in the IOT environment
Lightweight Cipher
Creating and Sending of the Input signal
Applying the procedure of quantization for mapping large
input set to smaller output set
Decomposing the larger quantized frame into smaller
quantized frame
Length of
the first
frame: F1
Length of
the second
frame: F2
Length of
the third
frame: F3
Length of
the fourth
frame: F4
Length of the
N-1 frame:
F(N-1)
Length of
the N frame:
FN
Developing the transposition matrix V i
Length of
the first
transpositio
n frame: V1
Length of
the second
transpositio
n frame: V2
Length of
the third
transpositio
n frame: V3
Length of
the fourth
transpositio
n frame: V4
Length of
the N-1
transpositio
n frame:
V(N-1)
Length of
the N
transpositio
n Frame: VN
Developed the quantized encrypted output signal
For the transposition matrix (V1…….VN frames)
Evaluate the difference in the input signal and the output
signal recieved
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
chevron_up_icon
1 out of 1
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]