Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems)
- PDF / 5,057,584 Bytes
- 30 Pages / 439.37 x 666.142 pts Page_size
- 42 Downloads / 170 Views
Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems) Seyyed Keyvan Mousavi1 · Ali Ghaffari2 · Sina Besharat1,3 · Hamed Afshari4
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Internet of Things (IoT) deploys a wide range of technologies including wireless sensor networks, machine-to-machine communication, robots, internet technologies, and smart devices. IoT is a novel phenomenon in the IT world wherein objects can transmit data, and interact through the internet or intranet networks. But the most important and crucial issue on the IoT is privacy and data security. The objective of this paper is to create a new encryption model for data storage servers in an IoT-based irrigation systems. Thus, a hybrid encryption algorithm based on Elliptic Curve Cryptography (ECC), RC4, and SHA-256 is proposed to protect sensitive data of IoT-based irrigation systems. The proposed model uses ECC to improve RC4. In RC4, XOR operation is performed using a key encrypted by ECC and shift-right, and then the resulting data are transformed to SHA256 to ensure security. Simulation results indicate that encryption and decryption time in the proposed model are shorter than other models like XXTEA & ECC, XXTEA & RSA, ECC&3DES&SHA-256, RC4&3DES&SHA-256, AES&RC4&SHA-256, AES&3DES &SHA-256, RC4&AES&SHA-256, RC2&3DES&SHA-256, and ECC&RC2&SHA-256 with, 43.39%, 66.03%, 45.28%, 54.71%, 50.94%, 33.96%, 33.62%, 24.52%, and, 15.09% respectively. Keywords Internet of things · Security · Cryptography · RC4 · ECC · SHA-256
* Ali Ghaffari [email protected] Seyyed Keyvan Mousavi [email protected] Sina Besharat [email protected] Hamed Afshari [email protected] 1
Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran
2
Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran
3
Department of Water Engineering, Faculty of Agricultural Sciences, Urmia University, Urmia, Iran
4
Department of Mechanical and Bio Mechanical Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran
13
Vol.:(0123456789)
S. K. Mousavi et al.
1 Introduction IoT is most used for building heterogeneous environments where various devices with different features work together to process and deliver data to end users [1, 2]. Identifying and tracking objects, wireless smart networks, and smart protocols for objects are key features of IoT [3]. Confidentiality and data security are an issue in IoT application. The security of IoT devices in business transactions and processes is highly sophisticated because providing security of objects with specific restrictions and features on a global scale is difficult [4]. To prevent different attacks various methods such as message encryption and authentication procedure, public key algorithms, hash algorithms, and digital signature algorithms should be used [5, 6]. Farmers can use the IoT-based irrigation systems to irrigate the farm at the right time with the le
Data Loading...