Skip to main content
Top

2023 | OriginalPaper | Chapter

HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks

Authors : S. Hariprasad, T. Deepa, N. Bharathiraja

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of things (IoT) devices can store and manage the real-time data created by many restricted Internet-connected devices. If one of the nodes were compromised due to Man-in-the-Middle (MITM) attack, the network might suffer significant damage. Due to the limited resources of constrained devices, it is difficult to incorporate appropriate cryptographic capabilities. Hence lightweight cryptography strives to meet the security needs of situations with few resource-constrained devices. In this paper, the framework is constructed using the smart aircraft environment monitoring system (SAEMS) and created with the help of nodes and the message queuing telemetry transport (MQTT) protocol for communicating the sensor data. A hybrid lightweight encryption algorithm (HLWEA) is proposed to mitigate the MITM attack on IoT devices. The HLWEA comprises (i) Key generation and (ii) encryption and decryption. The proposed method achieves an encryption time of 0.0309 ms; encryption bandwidth is 19.02 kbps, decryption time of 0.029 ms and decryption bandwidth of 19.36 kpbs. The proposed implementation is a smaller key size, minimal time complexity, and enhanced real-time cryptography-capable security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ahmad T, Morelli U, Ranise S, Zannone N (2022) Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int J Inf Secur 21(2):379–408CrossRef Ahmad T, Morelli U, Ranise S, Zannone N (2022) Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int J Inf Secur 21(2):379–408CrossRef
2.
go back to reference Akhtar S, Zahoor E (2021) Formal specification and verification of MQTT protocol in pluscal-2. Wireless Pers Commun 119(2):1589–1606CrossRef Akhtar S, Zahoor E (2021) Formal specification and verification of MQTT protocol in pluscal-2. Wireless Pers Commun 119(2):1589–1606CrossRef
3.
go back to reference Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The simon and speck lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference, pp 1–6 Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The simon and speck lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference, pp 1–6
4.
go back to reference Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 450–466 Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 450–466
5.
go back to reference Borghoff J, Canteaut A, Güneysu T, Kavun EB, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C et al. (2012) Prince–a low-latency block cipher for pervasive computing applications. In: International conference on the theory and application of cryptology and information security, Springer, pp 208–225 Borghoff J, Canteaut A, Güneysu T, Kavun EB, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C et al. (2012) Prince–a low-latency block cipher for pervasive computing applications. In: International conference on the theory and application of cryptology and information security, Springer, pp 208–225
6.
go back to reference Cannière CD, Dunkelman O, Knežević M (2009) Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 272–288 Cannière CD, Dunkelman O, Knežević M (2009) Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 272–288
7.
go back to reference Chatterjee R, Chakraborty R, Mondal J (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224CrossRef Chatterjee R, Chakraborty R, Mondal J (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224CrossRef
9.
go back to reference González-Zapata AM, Tlelo-Cuautle E, Cruz-Vega I, León-Salas WD (2021) Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol. Nonlinear Dyn 104(4):4581–4600CrossRef González-Zapata AM, Tlelo-Cuautle E, Cruz-Vega I, León-Salas WD (2021) Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol. Nonlinear Dyn 104(4):4581–4600CrossRef
10.
go back to reference Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 326–341 Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 326–341
11.
go back to reference Gupta V, Khera S, Turk N (2021) MQTT protocol employing IoT based home safety system with ABE encryption. Multimedia Tools Appl 80(2):2931–2949CrossRef Gupta V, Khera S, Turk N (2021) MQTT protocol employing IoT based home safety system with ABE encryption. Multimedia Tools Appl 80(2):2931–2949CrossRef
12.
go back to reference Haripriya A, Kulothungan K (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect dos attack in MQTT protocol for internet of things. EURASIP J Wirel Commun Netw 2019(1):1–15 Haripriya A, Kulothungan K (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect dos attack in MQTT protocol for internet of things. EURASIP J Wirel Commun Netw 2019(1):1–15
13.
go back to reference Herrero R (2020) MQTT-SN, COAP, and RTP in wireless IoT real-time communications. Multimedia Syst 26(6):643–654CrossRef Herrero R (2020) MQTT-SN, COAP, and RTP in wireless IoT real-time communications. Multimedia Syst 26(6):643–654CrossRef
14.
go back to reference Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K et al (2006) Hight: A new block cipher suitable for low-resource device. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 46–59 Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K et al (2006) Hight: A new block cipher suitable for low-resource device. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 46–59
15.
go back to reference Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Pers Commun 91(4):1765–1777CrossRef Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Pers Commun 91(4):1765–1777CrossRef
16.
go back to reference Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure IoT protocols for microgrid communication. Futur Gener Comput Syst 116:1–12CrossRef Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure IoT protocols for microgrid communication. Futur Gener Comput Syst 116:1–12CrossRef
17.
go back to reference Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the world congress on engineering, vol 1, pp 419–422 Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the world congress on engineering, vol 1, pp 419–422
18.
go back to reference Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 69–88 Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 69–88
19.
go back to reference Nawandar NK, Satpute VR (2019) IoT based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990CrossRef Nawandar NK, Satpute VR (2019) IoT based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990CrossRef
20.
go back to reference Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319 Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319
21.
go back to reference Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, camellia, and triple-des. In: International conference on information security, Springer, pp 252–266 Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, camellia, and triple-des. In: International conference on information security, Springer, pp 252–266
22.
go back to reference Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of COAP and MQTT with security support for IoT environments. Comput Netw 197:108338CrossRef Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of COAP and MQTT with security support for IoT environments. Comput Netw 197:108338CrossRef
23.
go back to reference Sharma S, Chopra V (2017) Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman. Int J Sec Appl 11(3):17–28 Sharma S, Chopra V (2017) Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman. Int J Sec Appl 11(3):17–28
24.
go back to reference Siddharthan H, Deepa T, Chandhar P (2022) SenMOTT-set: an intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 10:33095–33110CrossRef Siddharthan H, Deepa T, Chandhar P (2022) SenMOTT-set: an intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 10:33095–33110CrossRef
26.
go back to reference Suma V, Haoxiang W (2020) Optimal key handover management for enhancing security in mobile network. J Trends Comput Sci Smart Technol (TCSST) 2(04):181–187CrossRef Suma V, Haoxiang W (2020) Optimal key handover management for enhancing security in mobile network. J Trends Comput Sci Smart Technol (TCSST) 2(04):181–187CrossRef
27.
go back to reference Suzaki T, Minematsu K, Morioka S, Kobayashi E (2011) Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography, vol 2011 Suzaki T, Minematsu K, Morioka S, Kobayashi E (2011) Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography, vol 2011
28.
go back to reference Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27CrossRef Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27CrossRef
29.
go back to reference Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci 58(12):1–15 Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci 58(12):1–15
Metadata
Title
HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks
Authors
S. Hariprasad
T. Deepa
N. Bharathiraja
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_59

Premium Partner