Skip to main content
Erschienen in: Earth Science Informatics 1/2024

20.12.2023 | Research

Enhanced Elliptic Curve- Diffie Hellman Technique with Bigdata Analytics for Satellite Image Security Enhancement in Internet of Things Systems

verfasst von: N. Madhusudhana Reddy, Anil Kumar Budati, Shayla Islam, Gajula Ramesh

Erschienen in: Earth Science Informatics | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the emergence of cloud eco-system and technologies like Internet of Things (IoT), bit data analytics became essential to reap benefits of maintaining large volumes of data. As there is amalgamation of different devices, protocols, standard and use cases linked to IoT, there is increasing risk of security. IoT applications are vulnerable due to lack of security standards at global level. There is need for continuous efforts to provide end-to-end security in IoT applications. Sensor networks associated with IoT are resource constrained but produce large volumes of data or big data. In such environment, more light weight security primitives. Elliptic Curve Diffie Hellman (ECDH) is one such lightweight scheme for secure key exchange among connected devices. Nevertheless, ECDH is found vulnerable to attacks. To address this problem, we proposed a scheme known as E-ECDH (ECDH+SIGH) which is an enhanced version of ECDH. Our scheme is designed to enhance security level in IoT use cases. To evaluate our scheme, we used an IoT use case meant for anomaly detection in healthcare context. This application is in distributed environment where cloud infrastructure, IoT platform and Message Queue Telemetry Transport (MQTT) protocol are involved. Our experimental study showed that E-ECDH improves level of security in given IoT application and found to be better than existing security schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahamed J, Rajan AV (2016) Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, pp. 1-5 Ahamed J, Rajan AV (2016) Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, pp. 1-5
Zurück zum Zitat Alferidah DK, Jhanjhi NZ (2020) “A review on security and privacy issues and challenges in internet of things”, IJCSNS International Journal of Computer Science and Network. Security 20(4) Alferidah DK, Jhanjhi NZ (2020) “A review on security and privacy issues and challenges in internet of things”, IJCSNS International Journal of Computer Science and Network. Security 20(4)
Zurück zum Zitat Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. In: IEEE Commun SurvTutor 22(3):1646–1685 Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. In: IEEE Commun SurvTutor 22(3):1646–1685
Zurück zum Zitat AL-mawee W (2012) Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey. Master's Theses. 651 AL-mawee W (2012) Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey. Master's Theses. 651
Zurück zum Zitat Ammar M, Russello G, Crispo B (2018) Internet of Things: A survey on the security of IoT frameworks. J Inform Sec Appli 38:8–27 Ammar M, Russello G, Crispo B (2018) Internet of Things: A survey on the security of IoT frameworks. J Inform Sec Appli 38:8–27
Zurück zum Zitat Ande R, Adebisi B, Hammoudeh M, Saleem J (2020) Internet of Things: Evolution and technologies from a security perspective. Sustain Cities Soc 54:101728CrossRef Ande R, Adebisi B, Hammoudeh M, Saleem J (2020) Internet of Things: Evolution and technologies from a security perspective. Sustain Cities Soc 54:101728CrossRef
Zurück zum Zitat Azmoodeh A, Dehghantanha A, Raymond Choo KK (2019) Big data and internet of things security and forensics: Challenges and opportunities. Handbook Big Data IoT Sec:1–4 Azmoodeh A, Dehghantanha A, Raymond Choo KK (2019) Big data and internet of things security and forensics: Challenges and opportunities. Handbook Big Data IoT Sec:1–4
Zurück zum Zitat T. Baranwal, Nitika R, Pateriya PK (2016) Development of IoT based smart security and monitoring devices for agriculture. 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), Noida, India, pp. 597-602 T. Baranwal, Nitika R, Pateriya PK (2016) Development of IoT based smart security and monitoring devices for agriculture. 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), Noida, India, pp. 597-602
Zurück zum Zitat Berkay Celik Z (2018) Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. ACM Comput Surv 52(4):1–30CrossRef Berkay Celik Z (2018) Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. ACM Comput Surv 52(4):1–30CrossRef
Zurück zum Zitat Bernstein DJ (2006) “Curve25519: New Di_e-Hellman speed records”, In M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, editors, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, volume 3958 of Lecture Notes in Computer Science, pages 207-228. Springer Bernstein DJ (2006) “Curve25519: New Di_e-Hellman speed records”, In M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, editors, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, volume 3958 of Lecture Notes in Computer Science, pages 207-228. Springer
Zurück zum Zitat Bos JW, Friedberger SJ (2019) Arithmetic considerations for isogeny-based cryptography. IEEE Trans Comput 68(7):979–990CrossRef Bos JW, Friedberger SJ (2019) Arithmetic considerations for isogeny-based cryptography. IEEE Trans Comput 68(7):979–990CrossRef
Zurück zum Zitat Craig C, Longa P, Naehrig M (2016) Efficient algorithms for supersingular isogeny Diffie-Hellman. In” Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I 36, pp. 572-601 Craig C, Longa P, Naehrig M (2016) Efficient algorithms for supersingular isogeny Diffie-Hellman. In” Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I 36, pp. 572-601
Zurück zum Zitat S. K. Datta and C. Bonnet (2016) Easing IoT application development through DataTweet framework. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, pp. 430-435 S. K. Datta and C. Bonnet (2016) Easing IoT application development through DataTweet framework. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, pp. 430-435
Zurück zum Zitat Datta SK, Gyrard A, Bonnet C, Boudaoud K (2015) oneM2M architecture based user centric IoT application development. 3rd International Conference on Future Internet of Things and Cloud, pp.1-8 Datta SK, Gyrard A, Bonnet C, Boudaoud K (2015) oneM2M architecture based user centric IoT application development. 3rd International Conference on Future Internet of Things and Cloud, pp.1-8
Zurück zum Zitat David J, De Feo L (2011) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, Proceedings 2011, 4, pp. 19-34 David J, De Feo L (2011) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, Proceedings 2011, 4, pp. 19-34
Zurück zum Zitat Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654CrossRef Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654CrossRef
Zurück zum Zitat Ejaz W, Anpalagan A (2019) Internet of things for smart cities: technologies, big data and security. Springer International Publishing, Berlin/Heidelberg, GermanyCrossRef Ejaz W, Anpalagan A (2019) Internet of things for smart cities: technologies, big data and security. Springer International Publishing, Berlin/Heidelberg, GermanyCrossRef
Zurück zum Zitat Giuseppe A, Persico V, Pescapé A (2020) Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0. J Ind Inf Integr 18:100129 Giuseppe A, Persico V, Pescapé A (2020) Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0. J Ind Inf Integr 18:100129
Zurück zum Zitat Hasan MK, Ahmed MM, Musa SS, Islam S, Abdullah SNHS, Hossain E, Nafi NS, Vo N. (2021b). An Improved Dynamic Thermal Current Rating Model for PMU-Based Wide Area Measurement Framework for Reliability Analysis Utilizing Sensor Cloud System . IEEE Access, pp.1–13. https://doi.org/10.1109/access.2021.3052368 Hasan MK, Ahmed MM, Musa SS, Islam S, Abdullah SNHS, Hossain E, Nafi NS, Vo N. (2021b). An Improved Dynamic Thermal Current Rating Model for PMU-Based Wide Area Measurement Framework for Reliability Analysis Utilizing Sensor Cloud System . IEEE Access, pp.1–13. https://​doi.​org/​10.​1109/​access.​2021.​3052368
Zurück zum Zitat Hasan MK, Ghazal TM, Alkhalifah A, Ab KA. (2021a). Fischer Linear Discrimination and Quadratic Discrimination Analysis–Based Data Mining Technique for Internet of Things. Front Public Health 9, pp.1-18. Hasan MK, Ghazal TM, Alkhalifah A, Ab KA. (2021a). Fischer Linear Discrimination and Quadratic Discrimination Analysis–Based Data Mining Technique for Internet of Things. Front Public Health 9, pp.1-18.
Zurück zum Zitat Jeffrey H, Pipher J, Silverman JH (1998) NTRU: A ring-based public key cryptosystem. In: International algorithmic number theory symposium, pp. 267-288. Berlin, Heidelberg: Springer Berlin Heidelberg Jeffrey H, Pipher J, Silverman JH (1998) NTRU: A ring-based public key cryptosystem. In: International algorithmic number theory symposium, pp. 267-288. Berlin, Heidelberg: Springer Berlin Heidelberg
Zurück zum Zitat F. Jonsson and M. Tornkvist (2017) RSA authentication in internet of things. Degree Project In Technology, First Cycle, 15 Credits Stockholm, Sweden F. Jonsson and M. Tornkvist (2017) RSA authentication in internet of things. Degree Project In Technology, First Cycle, 15 Credits Stockholm, Sweden
Zurück zum Zitat Kang Y-M, Han M-R, Han K-S, Kim J-B (2015) A study on the internet of things (IoT) applications. Int J Software Eng Appli 9(9):117–126 Kang Y-M, Han M-R, Han K-S, Kim J-B (2015) A study on the internet of things (IoT) applications. Int J Software Eng Appli 9(9):117–126
Zurück zum Zitat Li C (2020) Information processing in Internet of Things using big data analytics. Comput Commun 160:718–729CrossRef Li C (2020) Information processing in Internet of Things using big data analytics. Comput Commun 160:718–729CrossRef
Zurück zum Zitat Liu Z, Yan T (2013) Study on multi-view video based on IOT and its application in intelligent security system," Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shenyang, China, pp. 1437-1440 Liu Z, Yan T (2013) Study on multi-view video based on IOT and its application in intelligent security system," Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shenyang, China, pp. 1437-1440
Zurück zum Zitat López D, Daniel MBU, Cely CS, Murgueitio DT et al (2018) Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry 10(12):669CrossRef López D, Daniel MBU, Cely CS, Murgueitio DT et al (2018) Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry 10(12):669CrossRef
Zurück zum Zitat McEliece RJ (1978) A public-key cryptosystem based on algebraic coding theory. Coding Thv 4244:114–116 McEliece RJ (1978) A public-key cryptosystem based on algebraic coding theory. Coding Thv 4244:114–116
Zurück zum Zitat Merkle RC (1979) Secrecy, authentication, and public key systems. PhD thesis, Stanford University Merkle RC (1979) Secrecy, authentication, and public key systems. PhD thesis, Stanford University
Zurück zum Zitat Mike H (2015) Ed448-Goldilocks, a new elliptic curve." Cryptology ePrint Archive Mike H (2015) Ed448-Goldilocks, a new elliptic curve." Cryptology ePrint Archive
Zurück zum Zitat Milne JS (1986) Arithmetic Geometry, chapter Abelian Varieties, pp.103-150. Springer New York, New York, NY Milne JS (1986) Arithmetic Geometry, chapter Abelian Varieties, pp.103-150. Springer New York, New York, NY
Zurück zum Zitat Montgomery PL (1987) Speeding the Pollard and elliptic curve methods of factorization. Math Comput 48(177):243–264CrossRef Montgomery PL (1987) Speeding the Pollard and elliptic curve methods of factorization. Math Comput 48(177):243–264CrossRef
Zurück zum Zitat Nguyen Duc A, Ronald J, Pangkaj P, Abrahamsson P (2017) Security challenges in IoT development: a software engineering perspective. pp.1-5 Nguyen Duc A, Ronald J, Pangkaj P, Abrahamsson P (2017) Security challenges in IoT development: a software engineering perspective. pp.1-5
Zurück zum Zitat Nguyen XT, Tran HT, Baraki H, Geihs K (2015) FRASAD: A framework for model-driven IoT Application Development. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, pp 387–392 Nguyen XT, Tran HT, Baraki H, Geihs K (2015) FRASAD: A framework for model-driven IoT Application Development. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, pp 387–392
Zurück zum Zitat Patarin J (1996) Hidden _elds equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: U. M. Maurer, editor, EUROCRYPT '96, volume 1070 of LNCS, pp. 33-48 Patarin J (1996) Hidden _elds equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: U. M. Maurer, editor, EUROCRYPT '96, volume 1070 of LNCS, pp. 33-48
Zurück zum Zitat Pustišek M, Kos A (2018) “Approaches to front-end IoT application development for the ethereum blockchain”, Science Direct. Procedia Comput Sci 129:410–419CrossRef Pustišek M, Kos A (2018) “Approaches to front-end IoT application development for the ethereum blockchain”, Science Direct. Procedia Comput Sci 129:410–419CrossRef
Zurück zum Zitat Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A aystemic approach for IoT security. DCOSS, Boston, United States. pp.351-355 Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A aystemic approach for IoT security. DCOSS, Boston, United States. pp.351-355
Zurück zum Zitat Savola RM, Savolainen P, Evesti A, Abie H, Sihvonen M (2015) Risk-driven security metrics development for an e-health IoT application. 2015 Information Security for South Africa (ISSA), Johannesburg, South Africa, pp. 1-6 Savola RM, Savolainen P, Evesti A, Abie H, Sihvonen M (2015) Risk-driven security metrics development for an e-health IoT application. 2015 Information Security for South Africa (ISSA), Johannesburg, South Africa, pp. 1-6
Zurück zum Zitat Shami TM, Grace D, Burr A (2018) Load balancing and control using particle swarm optimisation in 5G heterogeneous networks. IEEE:1–6 Shami TM, Grace D, Burr A (2018) Load balancing and control using particle swarm optimisation in 5G heterogeneous networks. IEEE:1–6
Zurück zum Zitat Shayla I, Khalifa OO, Abdalla HAH, Kamrul HM, Razzaque MA, Biswajeet P. (2020). Design and Evaluation of a Multihoming-Based Mobility Management Scheme to Support Inter Technology Handoff in PNEMO. Wireless Personal Communications, pp.1-21. https://doi.org/10.1007/s11277-020-07412-0 Shayla I, Khalifa OO, Abdalla HAH, Kamrul HM, Razzaque MA, Biswajeet P. (2020). Design and Evaluation of a Multihoming-Based Mobility Management Scheme to Support Inter Technology Handoff in PNEMO. Wireless Personal Communications, pp.1-21. https://​doi.​org/​10.​1007/​s11277-020-07412-0
Zurück zum Zitat Sreeja R, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded iot devices. Symmetry 11(2):293CrossRef Sreeja R, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded iot devices. Symmetry 11(2):293CrossRef
Zurück zum Zitat Suma DV (2019) Towards sustainable industrialization using big data and internet of things. J IoT in Social, Mobile, Analytics, Cloud 1(1):24–37 Suma DV (2019) Towards sustainable industrialization using big data and internet of things. J IoT in Social, Mobile, Analytics, Cloud 1(1):24–37
Zurück zum Zitat Sutjiatmo BP, Erwinsyah A, Lydia EL, Shankar K et al (2019) Empowering internet of things (IoT) through big data. Int J Eng Adv Technol 8, no. 6S2:938–942CrossRef Sutjiatmo BP, Erwinsyah A, Lydia EL, Shankar K et al (2019) Empowering internet of things (IoT) through big data. Int J Eng Adv Technol 8, no. 6S2:938–942CrossRef
Zurück zum Zitat Tellez M, El-Tawab S, Heydari MH (2016) IoT security attacks using reverse engineering methods on WSN applications. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, pp. 182-187 Tellez M, El-Tawab S, Heydari MH (2016) IoT security attacks using reverse engineering methods on WSN applications. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, pp. 182-187
Zurück zum Zitat Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95:169–185CrossRef Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95:169–185CrossRef
Zurück zum Zitat Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Pervasive Comput Commun 10(4):372–392CrossRef Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Pervasive Comput Commun 10(4):372–392CrossRef
Zurück zum Zitat Weiqiang L, Jian N, Zhe L, Chunyang L, O'Neill M (2019) Optimized modular multiplication for supersingular isogeny diffie-hellman. IEEE Trans Comput:1–1 Weiqiang L, Jian N, Zhe L, Chunyang L, O'Neill M (2019) Optimized modular multiplication for supersingular isogeny diffie-hellman. IEEE Trans Comput:1–1
Zurück zum Zitat Yashwant D, Joshi V (2018) “Some issues on architecture for secure services for IoT”, Department of Electronics and Telecommunication. Engineering:1–13 Yashwant D, Joshi V (2018) “Some issues on architecture for secure services for IoT”, Department of Electronics and Telecommunication. Engineering:1–13
Metadaten
Titel
Enhanced Elliptic Curve- Diffie Hellman Technique with Bigdata Analytics for Satellite Image Security Enhancement in Internet of Things Systems
verfasst von
N. Madhusudhana Reddy
Anil Kumar Budati
Shayla Islam
Gajula Ramesh
Publikationsdatum
20.12.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Earth Science Informatics / Ausgabe 1/2024
Print ISSN: 1865-0473
Elektronische ISSN: 1865-0481
DOI
https://doi.org/10.1007/s12145-023-01194-2

Weitere Artikel der Ausgabe 1/2024

Earth Science Informatics 1/2024 Zur Ausgabe

Premium Partner