Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Efficient Framework to Secure Communication in IoT Using Novel Finite Field Encryption

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Offering resiliency against major threats to the exponentially massive number of physical devices in Internet-of-Things (IoT) is one of the most challenging problems in Ubiquitous Computing. Most recently, researchers have evolved up with many security solutions to find that they do not offer proper performance equilibrium between security performance and communication. Therefore, this problem is addressed by proposed a novel analytical framework that uses highly enhanced finite field encryption to ensure that messages exchanged between IoT nodes are highly secured irrespective of any forms of threat level. The study outcome of proposed system shows that it offer reduced energy, reduced delay, and maximized data delivery performance with higher degree of data integrity and privacy preservation performance in contrast to frequently used security protocols in IoT.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bouhaï, N., Saleh, I.: Internet of Things: Evolutions and Innovations. Wiley, New York (2017) Bouhaï, N., Saleh, I.: Internet of Things: Evolutions and Innovations. Wiley, New York (2017)
2.
go back to reference Chen, L.W., Chung, J.J.: Mobility-aware and congestion-relieved dedicated path planning for group-based emergency guiding based on internet of things technologies. IEEE Trans. Intell. Transp. Syst. 18(9), 2453–2466 (2017)CrossRef Chen, L.W., Chung, J.J.: Mobility-aware and congestion-relieved dedicated path planning for group-based emergency guiding based on internet of things technologies. IEEE Trans. Intell. Transp. Syst. 18(9), 2453–2466 (2017)CrossRef
3.
go back to reference Bi, Y., Han, G., Lin, C., Deng, Q., Guo, L., Li, F.: Mobility support for fog computing: an SDN approach. IEEE Commun. Mag. 56(5), 53–59 (2018)CrossRef Bi, Y., Han, G., Lin, C., Deng, Q., Guo, L., Li, F.: Mobility support for fog computing: an SDN approach. IEEE Commun. Mag. 56(5), 53–59 (2018)CrossRef
4.
go back to reference Chen, L., et al.: Robustness, security and privacy in location-based services for future IoT: a survey. IEEE Access 5, 8956–8977 (2017)CrossRef Chen, L., et al.: Robustness, security and privacy in location-based services for future IoT: a survey. IEEE Access 5, 8956–8977 (2017)CrossRef
5.
go back to reference Ida, I.B., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: 2016 11th International Design & Test Symposium (IDT), Hammamet, pp. 25–30 (2016) Ida, I.B., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: 2016 11th International Design & Test Symposium (IDT), Hammamet, pp. 25–30 (2016)
6.
go back to reference Li, Z., Lu, Q., Zhu, L., Xu, X., Liu, Y., Zhang, W.: An empirical study of cloud API issues. IEEE Cloud Comput. 5(2), 58–72 (2018)CrossRef Li, Z., Lu, Q., Zhu, L., Xu, X., Liu, Y., Zhang, W.: An empirical study of cloud API issues. IEEE Cloud Comput. 5(2), 58–72 (2018)CrossRef
7.
go back to reference Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018) CrossRef Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018) CrossRef
8.
go back to reference Amiruddin, A., Ratna, A.A.P., Harwahyu, R., Sari, R.F.: Secure multi-protocol gateway for Internet of Things. In: 2018 Wireless Telecommunications Symposium (WTS), Phoenix, AZ, USA, pp. 1–8 (2018) Amiruddin, A., Ratna, A.A.P., Harwahyu, R., Sari, R.F.: Secure multi-protocol gateway for Internet of Things. In: 2018 Wireless Telecommunications Symposium (WTS), Phoenix, AZ, USA, pp. 1–8 (2018)
9.
go back to reference Ali, S., Khan, M.A., Ahmad, J., Malik, A.W., ur Rehman, A.: Detection and prevention of black hole attacks in IOT & WSN. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain, pp. 217–226 (2018) Ali, S., Khan, M.A., Ahmad, J., Malik, A.W., ur Rehman, A.: Detection and prevention of black hole attacks in IOT & WSN. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain, pp. 217–226 (2018)
10.
go back to reference Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, pp. 157–163 (2016) Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, pp. 157–163 (2016)
11.
go back to reference Aslam, A., Curry, E.: Towards a generalized approach for deep neural network based event processing for the internet of multimedia things. IEEE Access 6, 25573–25587 (2018) Aslam, A., Curry, E.: Towards a generalized approach for deep neural network based event processing for the internet of multimedia things. IEEE Access 6, 25573–25587 (2018)
12.
go back to reference Bhattarai, S., Wang, Y.: End-to-end trust and security for Internet of Things applications. Computer 51(4), 20–27 (2018)CrossRef Bhattarai, S., Wang, Y.: End-to-end trust and security for Internet of Things applications. Computer 51(4), 20–27 (2018)CrossRef
13.
go back to reference Chen, D., Yang, W., Hu, J., Cai, Y., Tang, X.: Energy-efficient secure transmission design for the Internet of Things with an untrusted relay. IEEE Access 6, 11862–11870 (2018)CrossRef Chen, D., Yang, W., Hu, J., Cai, Y., Tang, X.: Energy-efficient secure transmission design for the Internet of Things with an untrusted relay. IEEE Access 6, 11862–11870 (2018)CrossRef
14.
go back to reference Farooq, M.J., Zhu, Q.: On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans. Wirel. Commun. 17(4), 2618–2632 (2018)CrossRef Farooq, M.J., Zhu, Q.: On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans. Wirel. Commun. 17(4), 2618–2632 (2018)CrossRef
15.
go back to reference Gong, B., Wang, Y., Liu, X., Qi, F., Sun, Z.: A trusted attestation mechanism for the sensing nodes of Internet of Things based on dynamic trusted measurement. China Commun. 15(2), 100–121 (2018)CrossRef Gong, B., Wang, Y., Liu, X., Qi, F., Sun, Z.: A trusted attestation mechanism for the sensing nodes of Internet of Things based on dynamic trusted measurement. China Commun. 15(2), 100–121 (2018)CrossRef
16.
go back to reference He, D., Ye, R., Chan, S., Guizani, M., Xu, Y.: Privacy in the Internet of Things for smart healthcare. IEEE Commun. Mag. 56(4), 38–44 (2018) He, D., Ye, R., Chan, S., Guizani, M., Xu, Y.: Privacy in the Internet of Things for smart healthcare. IEEE Commun. Mag. 56(4), 38–44 (2018)
17.
go back to reference Hudson, F.D.: Enabling trust and security: TIPPSS for IoT. IT Prof. 20(2), 15–18 (2018)CrossRef Hudson, F.D.: Enabling trust and security: TIPPSS for IoT. IT Prof. 20(2), 15–18 (2018)CrossRef
18.
go back to reference Lee, P.Y., Yu, C.M., Dargahi, T., Conti, M., Bianchi, G.: MDSClone: multidimensional scaling aided clone detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8), 2031–2046 (2018)CrossRef Lee, P.Y., Yu, C.M., Dargahi, T., Conti, M., Bianchi, G.: MDSClone: multidimensional scaling aided clone detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8), 2031–2046 (2018)CrossRef
19.
go back to reference Li, L., Ren, G., Liu, Y., Wu, J.: Secure DHCPv6 mechanism for DHCPv6 security and privacy protection. Tsinghua Sci. Technol. 23(1), 13–21 (2018)CrossRef Li, L., Ren, G., Liu, Y., Wu, J.: Secure DHCPv6 mechanism for DHCPv6 security and privacy protection. Tsinghua Sci. Technol. 23(1), 13–21 (2018)CrossRef
20.
go back to reference Liu, Z., Choo, K.K.R., Grossschadl, J.: Securing edge devices in the post-quantum Internet of Things using lattice-based cryptography. IEEE Commun. Mag. 56(2), 158–162 (2018)CrossRef Liu, Z., Choo, K.K.R., Grossschadl, J.: Securing edge devices in the post-quantum Internet of Things using lattice-based cryptography. IEEE Commun. Mag. 56(2), 158–162 (2018)CrossRef
21.
go back to reference Ma, Y., Wu, Y., Ge, J., Li, J.: An architecture for accountable anonymous access in the Internet-of-Things network. IEEE Access 6, 14451–14461 (2018) Ma, Y., Wu, Y., Ge, J., Li, J.: An architecture for accountable anonymous access in the Internet-of-Things network. IEEE Access 6, 14451–14461 (2018)
22.
go back to reference Li, S., Bi, F., Chen, W., Miao, X., Liu, J., Tang, C.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)CrossRef Li, S., Bi, F., Chen, W., Miao, X., Liu, J., Tang, C.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)CrossRef
23.
go back to reference Liu, J., Zhang, C., Fang, Y.: EPIC: a differential privacy framework to defend smart homes against internet traffic analysis. IEEE Internet Things J. 5(2), 1206–1217 (2018)CrossRef Liu, J., Zhang, C., Fang, Y.: EPIC: a differential privacy framework to defend smart homes against internet traffic analysis. IEEE Internet Things J. 5(2), 1206–1217 (2018)CrossRef
24.
go back to reference Premsankar, G., Di Francesco, M., Taleb, T.: Edge computing for the Internet of Things: a case study. IEEE Internet Things J. 5(2), 1275–1284 (2018)CrossRef Premsankar, G., Di Francesco, M., Taleb, T.: Edge computing for the Internet of Things: a case study. IEEE Internet Things J. 5(2), 1275–1284 (2018)CrossRef
25.
go back to reference Qian, Y., Chen, M., Chen, J., Hossain, M.S., Alamri, A.: Secure enforcement in cognitive internet of vehicles. IEEE Internet Things J. 5(2), 1242–1250 (2018)CrossRef Qian, Y., Chen, M., Chen, J., Hossain, M.S., Alamri, A.: Secure enforcement in cognitive internet of vehicles. IEEE Internet Things J. 5(2), 1242–1250 (2018)CrossRef
26.
go back to reference Sen, S., Koo, J., Bagchi, S.: TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices. IEEE Internet Comput. 22(1), 74–81 (2018)CrossRef Sen, S., Koo, J., Bagchi, S.: TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices. IEEE Internet Comput. 22(1), 74–81 (2018)CrossRef
27.
go back to reference Li, G., Wu, J., Li, J., Guan, Z., Guo, L.: Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Access 6, 11278–11288 (2018)CrossRef Li, G., Wu, J., Li, J., Guan, Z., Guo, L.: Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Access 6, 11278–11288 (2018)CrossRef
28.
go back to reference Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.R.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30–36 (2018)CrossRef Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.R.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30–36 (2018)CrossRef
29.
go back to reference Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)CrossRef Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)CrossRef
30.
go back to reference Zhang, L.X., Dong, Q., Wang, J., Blaauw, D., Sylvester, D.: Recryptor: a reconfigurable cryptographic cortex-M0 processor with In-memory and near-memory computing for IoT security. IEEE J. Solid State Circ. 53(4), 995–1005 (2018) Zhang, L.X., Dong, Q., Wang, J., Blaauw, D., Sylvester, D.: Recryptor: a reconfigurable cryptographic cortex-M0 processor with In-memory and near-memory computing for IoT security. IEEE J. Solid State Circ. 53(4), 995–1005 (2018)
31.
go back to reference Chen, Y., et al.: A programmable Galois field processor for the Internet of Things. In: 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA), Toronto, ON, pp. 55–68 (2017) Chen, Y., et al.: A programmable Galois field processor for the Internet of Things. In: 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA), Toronto, ON, pp. 55–68 (2017)
Metadata
Title
Efficient Framework to Secure Communication in IoT Using Novel Finite Field Encryption
Author
Eisha Akanksha
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-00184-1_1

Premium Partner