Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 2/2022

07-10-2021 | Research Article-Computer Engineering and Computer Science

To Secure the Communication in Powerful Internet of Things Using Innovative Post-Quantum Cryptographic Method

Authors: Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari

Published in: Arabian Journal for Science and Engineering | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In general, the Internet of Things (IoT) is used for many applications and plays an essential role in the digital communications of smart city applications. However, securing the sensor-based IoT communication is difficult because it is highly vulnerable to malicious actions like Denial of Service (DOS), ransomware, and node impersonation. In the past several works were presented like Diffie–Hellman, supersingular isogeny, Merkle hash tree, etc., to secure the IoT communication. But, those techniques failed to identify the malicious events, which happened unexpectedly. Also, these procedures were limited to predict malicious events as the harmful attacks look like normal users. Hence, to enhance the privacy measure in IoT communication, a novel post-quantum cryptography (PQC) algorithm is introduced in this research. Here, powerful IoT devices concern with smart devices such as smartphones, smart security systems, and smartwatches. Furthermore, this paper has introduced a novel Diffie Supersingular Multiplication (DSM) for securing communication in powerful IoT devices. The developed approaches were validated by launching the Mirai botnet attack in the transmission channel. Moreover, the proposed DSM model has been implemented using the Xilinx ISE14.5 tool, which has improved 30% frequency, 24% area, 10% confidential rate and also has reduced the power up to 15%, error 10% and 20% delay, which are quite better than other compared techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
11.
go back to reference Karthikeyan, S.; Patan, R.; Balamurugan, B.: Enhancement of security in the Internet of Things (IoT) by using X.509 authentication mechanism. In: Khare, A.; Tiwary, U.; Sethi, I.; Singh, N. (Eds.) Recent Trends in Communication, Computing, and Electronics. Lecture Notes in Electrical Engineering, Vol. 524. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-2685-1_22CrossRefMATH Karthikeyan, S.; Patan, R.; Balamurugan, B.: Enhancement of security in the Internet of Things (IoT) by using X.509 authentication mechanism. In: Khare, A.; Tiwary, U.; Sethi, I.; Singh, N. (Eds.) Recent Trends in Communication, Computing, and Electronics. Lecture Notes in Electrical Engineering, Vol. 524. Springer, Singapore (2019). https://​doi.​org/​10.​1007/​978-981-13-2685-1_​22CrossRefMATH
13.
17.
go back to reference Nesa, N.; Banerjee, I.: A lightweight security protocol for IoT using Merkle hash tree and chaotic cryptography. In: Chaki, R.; Cortesi, A.; Saeed, K.; Chaki, N. (Eds.) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, Vol. 996. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8969-6_1CrossRef Nesa, N.; Banerjee, I.: A lightweight security protocol for IoT using Merkle hash tree and chaotic cryptography. In: Chaki, R.; Cortesi, A.; Saeed, K.; Chaki, N. (Eds.) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, Vol. 996. Springer, Singapore (2020). https://​doi.​org/​10.​1007/​978-981-13-8969-6_​1CrossRef
19.
go back to reference Ahmed, Z.; Danish, S.M.; Qureshi, H.K.; Lestas, M.: Protecting IoTs from Mirai botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. Limassol, Cyprus (2019). https://doi.org/10.1109/CAMAD.2019.8858484 Ahmed, Z.; Danish, S.M.; Qureshi, H.K.; Lestas, M.: Protecting IoTs from Mirai botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. Limassol, Cyprus (2019). https://​doi.​org/​10.​1109/​CAMAD.​2019.​8858484
20.
go back to reference Su, N.; Zhang, Y.; Li, M.: Research on data encryption standard based on AES algorithm in internet of things environment. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 2071–2075. Chengdu, China (2019). https://doi.org/10.1109/ITNEC.2019.8729488 Su, N.; Zhang, Y.; Li, M.: Research on data encryption standard based on AES algorithm in internet of things environment. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 2071–2075. Chengdu, China (2019). https://​doi.​org/​10.​1109/​ITNEC.​2019.​8729488
21.
go back to reference Casanova, A.; Faugere, J.-C.; Macario-Rat, G.; Patarin, J.; Perret, L.; Ryckeghem, J.: GeMSS: A Great Multivariate Short Signature. NIST PQC Project Round 2, Documentation (2019) Casanova, A.; Faugere, J.-C.; Macario-Rat, G.; Patarin, J.; Perret, L.; Ryckeghem, J.: GeMSS: A Great Multivariate Short Signature. NIST PQC Project Round 2, Documentation (2019)
23.
go back to reference Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D.: CRYSTALS-Dilithium algorithm specifications and supporting documentation. Part of the round 3 submission package to NIST (2019). https://pq-crystals.org/dilithium Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D.: CRYSTALS-Dilithium algorithm specifications and supporting documentation. Part of the round 3 submission package to NIST (2019). https://​pq-crystals.​org/​dilithium
Metadata
Title
To Secure the Communication in Powerful Internet of Things Using Innovative Post-Quantum Cryptographic Method
Authors
Swati Kumari
Maninder Singh
Raman Singh
Hitesh Tewari
Publication date
07-10-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 2/2022
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06166-6

Other articles of this Issue 2/2022

Arabian Journal for Science and Engineering 2/2022 Go to the issue

Research Article-Computer Engineering and Computer Science

Adiabatic Configurable Reversible Synthesizer for 5G Applications

Research Article-Computer Engineering and Computer Science

Distance Estimation from a Monocular Camera Using Face and Body Features

Research Article-Computer Engineering and Computer Science

Entity-Context and Relation-Context Combined Knowledge Graph Embeddings

Research Article-Computer Engineering and Computer Science

Hand Gesture Recognition from 2D Images by Using Convolutional Capsule Neural Networks

Premium Partners