Skip to main content
Top

2018 | OriginalPaper | Chapter

Cryptography Applied to the Internet of Things

Authors : Javier Sanchez Guerrero, Robert Vaca Alban, Marco Guachimboza, Cristina Páez Quinde, Margarita Narváez Ríos, Luis Alfredo Jimenez Ruiz

Published in: Teaching and Learning in a Digital World

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Concepts and technologies that have made it possible for devices to interconnect to real-world objects, have existed for some time. The Internet of things can be defined as a pervasive and ubiquitous network that allows the monitoring and control of the physical environment by collecting, processing and analyzing data generated by sensors or smart objects. As the number of devices connect to the Internet increases, it is necessary to provide a safe and reliable operation of such devices. This paper emphasizes the use of cryptographic algorithms that can be implemented in devices that can connect to the internet of things, in order to provide security for the transmission of information on the vast network of sensors, a network that is increasing in size and number. This paper describes the problem of security on networked devices and describes the main algorithms and processes that provide security to this technology. It is concluded that since the devices that form the Internet of things have little memory and processing, it is necessary to apply algorithms that use the least amount of bits, with encryption algorithms that are based on elliptic curves. The advancement of technologies and algorithms that provide security should be considered, because every day we are more dependent on the internet of things.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Allen, N.: Weaknesses cybersecurity to make smart cities threaten more costly and dangerous than analog their prdecessors. USAPP Allen, N.: Weaknesses cybersecurity to make smart cities threaten more costly and dangerous than analog their prdecessors. USAPP
2.
go back to reference Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRef Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRef
3.
go back to reference Breezely George, M., Igni Sabasti Prabu, S.: Secured key sharing in cloud storage using elliptic curve cryptography. In: Proceedings of the International Conference on Soft Computing Systems (2015) Breezely George, M., Igni Sabasti Prabu, S.: Secured key sharing in cloud storage using elliptic curve cryptography. In: Proceedings of the International Conference on Soft Computing Systems (2015)
4.
go back to reference Chaitanya, B., Sekhar, C., Ramesh, N.: IR IOT based smart device using CC3200. Sci. Technol Chaitanya, B., Sekhar, C., Ramesh, N.: IR IOT based smart device using CC3200. Sci. Technol
5.
go back to reference Chen, S., Maode, M., Zhenxing, L.: With an authentication scheme for identity-based cryptography M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)CrossRef Chen, S., Maode, M., Zhenxing, L.: With an authentication scheme for identity-based cryptography M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)CrossRef
7.
go back to reference Delfs, C., Galbraith, S.: Computing isogenies supersingular between elliptic curves over Fp. Des. Codes Cryptogr. 78(2), 425–440 (2016)MathSciNetCrossRefMATH Delfs, C., Galbraith, S.: Computing isogenies supersingular between elliptic curves over Fp. Des. Codes Cryptogr. 78(2), 425–440 (2016)MathSciNetCrossRefMATH
8.
go back to reference Galbraith, S., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1), 51–72 (2016)MathSciNetCrossRefMATH Galbraith, S., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1), 51–72 (2016)MathSciNetCrossRefMATH
9.
go back to reference Geetha, D., Sakthivel, D.: Orient stream cipher based service key management scheme for secure data access control using elliptic curve cryptography in wireless broadcast networks. Am.-Eurasian J. Sci. Res. 11(1), 63–71 (2016) Geetha, D., Sakthivel, D.: Orient stream cipher based service key management scheme for secure data access control using elliptic curve cryptography in wireless broadcast networks. Am.-Eurasian J. Sci. Res. 11(1), 63–71 (2016)
10.
go back to reference Hoffman, L.: Q & A: finding new directions in cryptography. Commun. ACM 59(6), 112–ff (2016) Hoffman, L.: Q & A: finding new directions in cryptography. Commun. ACM 59(6), 112–ff (2016)
11.
go back to reference Imagination Technologies: Internet of Things-device Opportunities for differentiation. Desing & Reuse Imagination Technologies: Internet of Things-device Opportunities for differentiation. Desing & Reuse
12.
go back to reference Kamboj, D., Gupta, D., Kumar, A.: Efficient scalar multiplication elliptic curve over. Int. J. Comput. Netw. Inf. Secur. 8(4), 56–61 (2016) Kamboj, D., Gupta, D., Kumar, A.: Efficient scalar multiplication elliptic curve over. Int. J. Comput. Netw. Inf. Secur. 8(4), 56–61 (2016)
13.
go back to reference Kanase, P., Gaikwad, S.: Smart hospitals using Internet of Things. Int. Res. J. Eng. Technol. 3(3), 1735–1737 (2016) Kanase, P., Gaikwad, S.: Smart hospitals using Internet of Things. Int. Res. J. Eng. Technol. 3(3), 1735–1737 (2016)
14.
go back to reference Khan, M., Deen, S., Jabbar, S., Gohar, M., Ghayvat, H., Mukhopadhyay, S.: Context-aware intelligent low power SmarHome based on the Internet of Things. Comput. Electr. Eng. 52, 208–222 (2016)CrossRef Khan, M., Deen, S., Jabbar, S., Gohar, M., Ghayvat, H., Mukhopadhyay, S.: Context-aware intelligent low power SmarHome based on the Internet of Things. Comput. Electr. Eng. 52, 208–222 (2016)CrossRef
15.
go back to reference Kopetz, H.: Internet of Things. In: Real-Time Systems, pp. 307–323. Springer (2011) Kopetz, H.: Internet of Things. In: Real-Time Systems, pp. 307–323. Springer (2011)
16.
go back to reference Kumar Das, S., Sharma, G., Kumar Kevät, P.: Integrity and authentication using elliptic curve cryptography. J. Interdisc. Res. Imperial (2016) Kumar Das, S., Sharma, G., Kumar Kevät, P.: Integrity and authentication using elliptic curve cryptography. J. Interdisc. Res. Imperial (2016)
17.
go back to reference Lechelt, Z., Rogers, Y., Marquardt, N., Shum, V.: Connectus: a new toolkit for teaching about the Internet of Things. In: Proceedings of the CHI 2016 Conference on Human Factors Extended Abstracts in Computing Systems, p. 4. ACM, New York (2016) Lechelt, Z., Rogers, Y., Marquardt, N., Shum, V.: Connectus: a new toolkit for teaching about the Internet of Things. In: Proceedings of the CHI 2016 Conference on Human Factors Extended Abstracts in Computing Systems, p. 4. ACM, New York (2016)
18.
go back to reference Maitin-Shepard, J., Tibouchi, M., Aranha, D.: Elliptic curve multiset hash. Cryptogr. Secur. (2016) Maitin-Shepard, J., Tibouchi, M., Aranha, D.: Elliptic curve multiset hash. Cryptogr. Secur. (2016)
19.
go back to reference Malina, L., Hajny, J., Hosek, J.: On perspective of security and privacy-preserving solutions in the Internet of Things. Comput. Netw. 102, 83–95 (2016)CrossRef Malina, L., Hajny, J., Hosek, J.: On perspective of security and privacy-preserving solutions in the Internet of Things. Comput. Netw. 102, 83–95 (2016)CrossRef
20.
go back to reference Nazim, M., Ali Shah, M., Kamran Abbasi, M.: Analysis of embedded web resources in web of things. In: Proceedings of the International Conference on Communication IOARP and Networks. IOARP, London (2015) Nazim, M., Ali Shah, M., Kamran Abbasi, M.: Analysis of embedded web resources in web of things. In: Proceedings of the International Conference on Communication IOARP and Networks. IOARP, London (2015)
21.
go back to reference Noor-ul-Ain, W., Atta-ur-Rahman, M., Nadeem, M., Abbasi Ghafoor, A.: Quantum cryptography trends: a milestone in information security. In: Advances in Intelligent Systems and Computing, pp. 25–39. Springer, Cham (2016) Noor-ul-Ain, W., Atta-ur-Rahman, M., Nadeem, M., Abbasi Ghafoor, A.: Quantum cryptography trends: a milestone in information security. In: Advances in Intelligent Systems and Computing, pp. 25–39. Springer, Cham (2016)
22.
go back to reference Powell, A.: Hacking in the Public Interest: Authority, Legtimacy, Means, and Ends. New Media & Society, New Haven (2016) Powell, A.: Hacking in the Public Interest: Authority, Legtimacy, Means, and Ends. New Media & Society, New Haven (2016)
23.
go back to reference Rao, M., Rao, B.: Paper reduction and total inter-carrier interference detection in canceled multiuser CDMA-OFDM CFO corrected elliptic curve cryptography with. Int. J. Appl. Eng. Res. 11(8), 5880–5888 (2016) Rao, M., Rao, B.: Paper reduction and total inter-carrier interference detection in canceled multiuser CDMA-OFDM CFO corrected elliptic curve cryptography with. Int. J. Appl. Eng. Res. 11(8), 5880–5888 (2016)
24.
go back to reference Scott, M.: Pairings faster using an efficient elliptic curve with an endomorphism. LNCS, pp. 258–269 (2005) Scott, M.: Pairings faster using an efficient elliptic curve with an endomorphism. LNCS, pp. 258–269 (2005)
25.
go back to reference Shafagh, H., Duquennoy, S., Hu, W.: Talos: encryupted query processing for the Internet of Things. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, New York (2015) Shafagh, H., Duquennoy, S., Hu, W.: Talos: encryupted query processing for the Internet of Things. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, New York (2015)
26.
go back to reference Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)CrossRef Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)CrossRef
27.
go back to reference Smart, N.: Elliptic curves. In: Cryptography Made Simple. University of Bristol, London (2016) Smart, N.: Elliptic curves. In: Cryptography Made Simple. University of Bristol, London (2016)
28.
go back to reference WIND: Security in the Internet of Things: Lessons from the Past for the Future Connected. WIND, USA (2013) WIND: Security in the Internet of Things: Lessons from the Past for the Future Connected. WIND, USA (2013)
29.
go back to reference Zambonelli, F.: Towards a general software engineering methodology for the Internet of Things. Softw. Eng. (2016) Zambonelli, F.: Towards a general software engineering methodology for the Internet of Things. Softw. Eng. (2016)
30.
go back to reference Palattella, M., Dohler, M., Grieco, A., Rizzo, G.: Internet of Things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun., 4 (2016). IEEE Palattella, M., Dohler, M., Grieco, A., Rizzo, G.: Internet of Things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun., 4 (2016). IEEE
Metadata
Title
Cryptography Applied to the Internet of Things
Authors
Javier Sanchez Guerrero
Robert Vaca Alban
Marco Guachimboza
Cristina Páez Quinde
Margarita Narváez Ríos
Luis Alfredo Jimenez Ruiz
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-73210-7_47

Premium Partner