Skip to main content

2024 | OriginalPaper | Buchkapitel

A New Compact-Data Encryption Standard (NC-DES) Algorithm Security and Privacy in Smart City

verfasst von : Abdullah J. Alzahrani

Erschienen in: Micro-Electronics and Telecommunication Engineering

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A smart city is an innovative, urban, organized, and sustainable city. It mainly depends on the Internet of Things (IoT) technology which improves the excellence of living, safety, the operational efficiency of urban services, decision-making, government services, and social well-being of its people. Smart city means dealing smart in education, government, mobility, households, and e-health. IoT enables all smart devices to connect through the Internet, like sensors, detectors, actuators, wearable’s, mobile phones, watches, and smoke detectors. The rapid increase of Internet of Things in most smart city applications defines new security hazards that threaten the confidentiality and safety of end devices. Therefore, it is significant to improve smart services and the information protection and privacy process. The IoT devices need wireless sensor links and Radio Frequency Identification (RFID) to benefit from IoT. These resource-limited require common authentication between the devices through the association of a novel device, where authentication and encryption of the data to be sent. This paper has three contributions. First, surveying the fundamental smart city privacy problems. Second, the paper proposes a firm, trivial, and energy-efficient security solution for IoT systems which is called; New Compact-Data Encryption Standard (NC-DES). Finally, a case study of the healthcare framework is taken as an example of IoT applications to provide secure transfer of the measured parameters. The proposed system proved that the IoT devices had been secured without wasting their limited resources.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Park E, Del Pobil AP, Kwon S (2018) The role of Internet of Things (IoT) in smart cities: technology roadmap-oriented approaches. Sustainability 10(5) Park E, Del Pobil AP, Kwon S (2018) The role of Internet of Things (IoT) in smart cities: technology roadmap-oriented approaches. Sustainability 10(5)
2.
Zurück zum Zitat Meijer A, Rodríguez Bolívar MP (2016) Governing the smart city. Int Rev Adm Sci 82(2):392–408 Meijer A, Rodríguez Bolívar MP (2016) Governing the smart city. Int Rev Adm Sci 82(2):392–408
3.
Zurück zum Zitat Aboshosha BW, Dessouky MM, Ramadan RR, El-Sayed A (2019) LCA-lightweight cryptographic algorithm for IoT constraint resources. Menoufia J Electron Eng Res 15:28, pp 374–380 Aboshosha BW, Dessouky MM, Ramadan RR, El-Sayed A (2019) LCA-lightweight cryptographic algorithm for IoT constraint resources. Menoufia J Electron Eng Res 15:28, pp 374–380
4.
Zurück zum Zitat Sterbenz JPG (2017) Smart city and IoT resilience, survivability, and disruption tolerance: challenges, modelling, and a survey of research opportunities. In: 2017 9th international workshop on resilient networks design and modeling (RNDM). IEEE, pp 1–6 Sterbenz JPG (2017) Smart city and IoT resilience, survivability, and disruption tolerance: challenges, modelling, and a survey of research opportunities. In: 2017 9th international workshop on resilient networks design and modeling (RNDM). IEEE, pp 1–6
5.
Zurück zum Zitat Weinberg BD, Milne GR, Andonova YG, Hajjat FM (2015) Internet of things: convenience versus privacy and secrecy. Bus Horiz 58(6):615–624CrossRef Weinberg BD, Milne GR, Andonova YG, Hajjat FM (2015) Internet of things: convenience versus privacy and secrecy. Bus Horiz 58(6):615–624CrossRef
6.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRef
7.
Zurück zum Zitat De Montjoye YA (2015) Computational privacy: towards privacy-conscientious uses of metadata. PhD diss., Massachusetts Institute of Technology De Montjoye YA (2015) Computational privacy: towards privacy-conscientious uses of metadata. PhD diss., Massachusetts Institute of Technology
8.
Zurück zum Zitat Mavragani A, Ochoa G (2019) Google Trends in infodemiology and infoveillance: methodology framework. JMIR Public Health Surveill 5(2) Mavragani A, Ochoa G (2019) Google Trends in infodemiology and infoveillance: methodology framework. JMIR Public Health Surveill 5(2)
9.
Zurück zum Zitat Aboshosha BW, Dessouky MM, El-Sayed A (2019) Energy efficient encryption algorithm for low resources devices. The Academic Research Community Publication Aboshosha BW, Dessouky MM, El-Sayed A (2019) Energy efficient encryption algorithm for low resources devices. The Academic Research Community Publication
10.
Zurück zum Zitat Kim J, Yoo SK (2013) Design of real-time vital-sign encryption module for personal healthcare device. J Inst Electron Inf Eng (2) Kim J, Yoo SK (2013) Design of real-time vital-sign encryption module for personal healthcare device. J Inst Electron Inf Eng (2)
11.
Zurück zum Zitat Pateriya RK, Sharma S (2011) The evolution of RFID security and privacy. In: Conference on communication systems and network technologies. IEEE, pp 115–119 Pateriya RK, Sharma S (2011) The evolution of RFID security and privacy. In: Conference on communication systems and network technologies. IEEE, pp 115–119
12.
Zurück zum Zitat Huang GT (2004) Emerging technologies that will change your world. Technol Rev 107(1):32–40 Huang GT (2004) Emerging technologies that will change your world. Technol Rev 107(1):32–40
13.
14.
Zurück zum Zitat Romero-Mariona J, Hallman R, Kline M, San Miguel J, Major M, Kerr L (2016) Security in the industrial internet of things-the C-SEC approach. In: International conference on internet of things and big data, vol 2, pp 421–428 Romero-Mariona J, Hallman R, Kline M, San Miguel J, Major M, Kerr L (2016) Security in the industrial internet of things-the C-SEC approach. In: International conference on internet of things and big data, vol 2, pp 421–428
15.
Zurück zum Zitat Matsui M (1994) Linear cryptanalysis of DES Cipher. In: Hellenseth T (ed) Advances in cryptology—EUROCRYPT ’93, vol 765. Springer, pp 286–397 Matsui M (1994) Linear cryptanalysis of DES Cipher. In: Hellenseth T (ed) Advances in cryptology—EUROCRYPT ’93, vol 765. Springer, pp 286–397
16.
Zurück zum Zitat Standard, Data Encryption. “Federal information processing standards publication 46.” National Bureau of Standards, US Department of Commerce 23 (1977) Standard, Data Encryption. “Federal information processing standards publication 46.” National Bureau of Standards, US Department of Commerce 23 (1977)
17.
Zurück zum Zitat Kim J, jin Lee B, Yoo SK (2013) Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th international conference of the IEEE engineering in medicine and biology society, pp 2283–2286 Kim J, jin Lee B, Yoo SK (2013) Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th international conference of the IEEE engineering in medicine and biology society, pp 2283–2286
18.
Zurück zum Zitat Butt TA, Afzaal M (2019) Security and privacy in smart cities: issues and current solutions. In: Smart technologies and innovation. Springer, Cham, pp 317–323 Butt TA, Afzaal M (2019) Security and privacy in smart cities: issues and current solutions. In: Smart technologies and innovation. Springer, Cham, pp 317–323
19.
Zurück zum Zitat Xu B, Da Xu L, Cai H, Xie C, Hu J, Bu F (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inf 10(2):1578–1586 Xu B, Da Xu L, Cai H, Xie C, Hu J, Bu F (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inf 10(2):1578–1586
20.
Zurück zum Zitat Sukanesh R, Vijayprasath S, Subathra P (2010) GSM based ECG tele-alert system. In: 2010 international conference on computing technologies. IEEE, pp 1–5 Sukanesh R, Vijayprasath S, Subathra P (2010) GSM based ECG tele-alert system. In: 2010 international conference on computing technologies. IEEE, pp 1–5
Metadaten
Titel
A New Compact-Data Encryption Standard (NC-DES) Algorithm Security and Privacy in Smart City
verfasst von
Abdullah J. Alzahrani
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9562-2_64

Neuer Inhalt