Enhanced Lightweight Algorithm to Secure Data Transmission in IoT Systems
- PDF / 2,038,831 Bytes
- 24 Pages / 439.37 x 666.142 pts Page_size
- 30 Downloads / 231 Views
Enhanced Lightweight Algorithm to Secure Data Transmission in IoT Systems Sarra Jebri1 · Arij Ben Amor2 · Mohamed Abid1 · Ammar Bouallegue2
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The Internet of Things (IoT) is the most recent Internet evolution that integrates many smart devices, such as constrained devices, smart tablets, smart vehicles, smart sensors and services used by organizations or individuals to support a variety of areas to improve life quality including precision agriculture, smart health, and environment monitoring. IoT applications are vulnerable to malicious threats, hence the need for a robust and lightweight algorithm for a complete IoT communication system. The proposed solution treats the majority of security issues and guarantees trust registration and anonymous mutual authentication. Also, our solution deals with the intractability problem between IoT nodes using anonymity of link direction. In this context, Elliptic Curve Cryptography, Identity Based Encryption and Pseudonym Based Cryptography techniques were used to ensure a lightweight secure IoT system. The results show the performance of the algorithm using Raspberry Pi 3 model B cards. Keywords ECC · Key agreement · Lightweight · Mutual authentication · Trust
1 Introduction Internet of Things (IoT) is a powerful communication concept related to various areas, namely smart grids, e-health and monitoring applications (such as agriculture, WSN and military system). IoT is a network of interconnected smart devices, namely smart vehicles, smart watches, smart phones, etc., which are accessible by Internet [1, 2]. * Sarra Jebri [email protected] Arij Ben Amor [email protected] Mohamed Abid [email protected] Ammar Bouallegue [email protected] 1
IResCoMath Unit, National Engineering School of Gabes, University of Gabes, Gabès, Tunisia
2
SysCom Laboratory, National Engineering School of Tunis, University of Tunis El Manar, Tunis, Tunisia
13
Vol.:(0123456789)
S. Jebri et al.
The smart objects integrate smart sensors to collect information. As this concept touches sensitive areas, many challenges in IoT should be overcome [3]. The present work focuses on the security of IoT system which is a huge challenge. A strong security and light mechanism is required to preclude spiteful interaction in the system. Confidentiality and privacy of exchanged data, authentication of users, anonymity and confidence are crucial needs for IoT applications that require new adequate solutions. Some solutions, proposed to secure Wireless Sensor Networks (WSN), could be easily applied to IoT which is generally represented as a network of sensors. In the literature, many solutions that improve security challenge in IoT use different cryptographic methods such as Identity Based Encryption (IBE), Elliptic Curve Cryptography (ECC), Pseudonym Based Cryptography (PBC) [4], Attribute Based Encryption (ABE), Diffie Hellman (DH) and Elliptic Curve Diffie Hellman (ECDH) [5, 6]. In these works [7–
Data Loading...