Skip to main content

2023 | OriginalPaper | Buchkapitel

HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks

verfasst von : S. Hariprasad, T. Deepa, N. Bharathiraja

Erschienen in: Intelligent Cyber Physical Systems and Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) devices can store and manage the real-time data created by many restricted Internet-connected devices. If one of the nodes were compromised due to Man-in-the-Middle (MITM) attack, the network might suffer significant damage. Due to the limited resources of constrained devices, it is difficult to incorporate appropriate cryptographic capabilities. Hence lightweight cryptography strives to meet the security needs of situations with few resource-constrained devices. In this paper, the framework is constructed using the smart aircraft environment monitoring system (SAEMS) and created with the help of nodes and the message queuing telemetry transport (MQTT) protocol for communicating the sensor data. A hybrid lightweight encryption algorithm (HLWEA) is proposed to mitigate the MITM attack on IoT devices. The HLWEA comprises (i) Key generation and (ii) encryption and decryption. The proposed method achieves an encryption time of 0.0309 ms; encryption bandwidth is 19.02 kbps, decryption time of 0.029 ms and decryption bandwidth of 19.36 kpbs. The proposed implementation is a smaller key size, minimal time complexity, and enhanced real-time cryptography-capable security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmad T, Morelli U, Ranise S, Zannone N (2022) Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int J Inf Secur 21(2):379–408CrossRef Ahmad T, Morelli U, Ranise S, Zannone N (2022) Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int J Inf Secur 21(2):379–408CrossRef
2.
Zurück zum Zitat Akhtar S, Zahoor E (2021) Formal specification and verification of MQTT protocol in pluscal-2. Wireless Pers Commun 119(2):1589–1606CrossRef Akhtar S, Zahoor E (2021) Formal specification and verification of MQTT protocol in pluscal-2. Wireless Pers Commun 119(2):1589–1606CrossRef
3.
Zurück zum Zitat Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The simon and speck lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference, pp 1–6 Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The simon and speck lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference, pp 1–6
4.
Zurück zum Zitat Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 450–466 Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 450–466
5.
Zurück zum Zitat Borghoff J, Canteaut A, Güneysu T, Kavun EB, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C et al. (2012) Prince–a low-latency block cipher for pervasive computing applications. In: International conference on the theory and application of cryptology and information security, Springer, pp 208–225 Borghoff J, Canteaut A, Güneysu T, Kavun EB, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C et al. (2012) Prince–a low-latency block cipher for pervasive computing applications. In: International conference on the theory and application of cryptology and information security, Springer, pp 208–225
6.
Zurück zum Zitat Cannière CD, Dunkelman O, Knežević M (2009) Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 272–288 Cannière CD, Dunkelman O, Knežević M (2009) Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 272–288
7.
Zurück zum Zitat Chatterjee R, Chakraborty R, Mondal J (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224CrossRef Chatterjee R, Chakraborty R, Mondal J (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224CrossRef
9.
Zurück zum Zitat González-Zapata AM, Tlelo-Cuautle E, Cruz-Vega I, León-Salas WD (2021) Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol. Nonlinear Dyn 104(4):4581–4600CrossRef González-Zapata AM, Tlelo-Cuautle E, Cruz-Vega I, León-Salas WD (2021) Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol. Nonlinear Dyn 104(4):4581–4600CrossRef
10.
Zurück zum Zitat Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 326–341 Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 326–341
11.
Zurück zum Zitat Gupta V, Khera S, Turk N (2021) MQTT protocol employing IoT based home safety system with ABE encryption. Multimedia Tools Appl 80(2):2931–2949CrossRef Gupta V, Khera S, Turk N (2021) MQTT protocol employing IoT based home safety system with ABE encryption. Multimedia Tools Appl 80(2):2931–2949CrossRef
12.
Zurück zum Zitat Haripriya A, Kulothungan K (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect dos attack in MQTT protocol for internet of things. EURASIP J Wirel Commun Netw 2019(1):1–15 Haripriya A, Kulothungan K (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect dos attack in MQTT protocol for internet of things. EURASIP J Wirel Commun Netw 2019(1):1–15
13.
Zurück zum Zitat Herrero R (2020) MQTT-SN, COAP, and RTP in wireless IoT real-time communications. Multimedia Syst 26(6):643–654CrossRef Herrero R (2020) MQTT-SN, COAP, and RTP in wireless IoT real-time communications. Multimedia Syst 26(6):643–654CrossRef
14.
Zurück zum Zitat Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K et al (2006) Hight: A new block cipher suitable for low-resource device. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 46–59 Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K et al (2006) Hight: A new block cipher suitable for low-resource device. In: International workshop on cryptographic hardware and embedded systems, Springer, pp 46–59
15.
Zurück zum Zitat Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Pers Commun 91(4):1765–1777CrossRef Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Pers Commun 91(4):1765–1777CrossRef
16.
Zurück zum Zitat Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure IoT protocols for microgrid communication. Futur Gener Comput Syst 116:1–12CrossRef Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure IoT protocols for microgrid communication. Futur Gener Comput Syst 116:1–12CrossRef
17.
Zurück zum Zitat Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the world congress on engineering, vol 1, pp 419–422 Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the world congress on engineering, vol 1, pp 419–422
18.
Zurück zum Zitat Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 69–88 Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 69–88
19.
Zurück zum Zitat Nawandar NK, Satpute VR (2019) IoT based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990CrossRef Nawandar NK, Satpute VR (2019) IoT based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990CrossRef
20.
Zurück zum Zitat Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319 Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319
21.
Zurück zum Zitat Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, camellia, and triple-des. In: International conference on information security, Springer, pp 252–266 Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, camellia, and triple-des. In: International conference on information security, Springer, pp 252–266
22.
Zurück zum Zitat Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of COAP and MQTT with security support for IoT environments. Comput Netw 197:108338CrossRef Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of COAP and MQTT with security support for IoT environments. Comput Netw 197:108338CrossRef
23.
Zurück zum Zitat Sharma S, Chopra V (2017) Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman. Int J Sec Appl 11(3):17–28 Sharma S, Chopra V (2017) Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman. Int J Sec Appl 11(3):17–28
24.
Zurück zum Zitat Siddharthan H, Deepa T, Chandhar P (2022) SenMOTT-set: an intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 10:33095–33110CrossRef Siddharthan H, Deepa T, Chandhar P (2022) SenMOTT-set: an intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 10:33095–33110CrossRef
26.
Zurück zum Zitat Suma V, Haoxiang W (2020) Optimal key handover management for enhancing security in mobile network. J Trends Comput Sci Smart Technol (TCSST) 2(04):181–187CrossRef Suma V, Haoxiang W (2020) Optimal key handover management for enhancing security in mobile network. J Trends Comput Sci Smart Technol (TCSST) 2(04):181–187CrossRef
27.
Zurück zum Zitat Suzaki T, Minematsu K, Morioka S, Kobayashi E (2011) Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography, vol 2011 Suzaki T, Minematsu K, Morioka S, Kobayashi E (2011) Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography, vol 2011
28.
Zurück zum Zitat Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27CrossRef Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27CrossRef
29.
Zurück zum Zitat Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci 58(12):1–15 Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci 58(12):1–15
Metadaten
Titel
HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks
verfasst von
S. Hariprasad
T. Deepa
N. Bharathiraja
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_59

Premium Partner