Skip to main content

2019 | OriginalPaper | Buchkapitel

A Lightweight Multi-level Encryption Model for IoT Applications

verfasst von : M. Durairaj, K. Muthuramalingam

Erschienen in: Cybersecurity and Secure Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) envisions connected, smart and pervasive nodes communicating while giving all kinds of assistance. Openness, comparatively colossal processing speed and wide distribution of IoT objects offered them an absolute destination for cyber-attacks. With the vast potential of IoT, there happen to all sorts of difficulties. In this article, an IoT environment has classified into three primary layers (i) Device layer, (ii) Communication Layer, (iii) Cloud Layer. Users, Devices, Gateway, Connection, Cloud, and Application are combined to create the various layers for IoT environment. The security issues in the cloud layer for IoT has addressed by a multilevel encryption scheme has proposed with flexible key management in the cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang Y et al (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5), 1250–1258CrossRef Yang Y et al (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5), 1250–1258CrossRef
2.
Zurück zum Zitat Stergiou C et al (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78:964–975CrossRef Stergiou C et al (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78:964–975CrossRef
3.
Zurück zum Zitat Podgorski D et al (2017) Towards a conceptual framework of OSH risk management in smart working environments based on smart PPE, ambient intelligence and the internet of things technologies. Int J Occup Saf Ergon23(1):1–20CrossRef Podgorski D et al (2017) Towards a conceptual framework of OSH risk management in smart working environments based on smart PPE, ambient intelligence and the internet of things technologies. Int J Occup Saf Ergon23(1):1–20CrossRef
4.
Zurück zum Zitat Cook, A et al (2018) Internet of cloud: security and privacy issues. In: Cloud computing for optimization: foundations, applications, and challenges. Springer, Cham, 271–301 Cook, A et al (2018) Internet of cloud: security and privacy issues. In: Cloud computing for optimization: foundations, applications, and challenges. Springer, Cham, 271–301
5.
Zurück zum Zitat Wang H, Zhang Z, Taleb T (2018) Special issue on security and privacy of IoT. World Wide Web 21(1):1–6CrossRef Wang H, Zhang Z, Taleb T (2018) Special issue on security and privacy of IoT. World Wide Web 21(1):1–6CrossRef
6.
Zurück zum Zitat Li, J et al (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef Li, J et al (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef
7.
Zurück zum Zitat Memos VA et al (2018) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Futur Gener Comput Syst 83:619–628CrossRef Memos VA et al (2018) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Futur Gener Comput Syst 83:619–628CrossRef
8.
Zurück zum Zitat Li B et al (2018) Hybridoram: practical oblivious cloud storage with constant bandwidth. Inf Sci Li B et al (2018) Hybridoram: practical oblivious cloud storage with constant bandwidth. Inf Sci
9.
Zurück zum Zitat Cheng C et al (2017) Securing the internet of things in a quantum world. IEEE Commun Mag 55(2):116–120 CrossRef Cheng C et al (2017) Securing the internet of things in a quantum world. IEEE Commun Mag 55(2):116–120 CrossRef
10.
Zurück zum Zitat Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. J Ambient Intell HumIzed Comput 1–16 Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. J Ambient Intell HumIzed Comput 1–16
11.
Zurück zum Zitat Bello O, Zeadally S, Badra M (2017) Network layer inter-operation of device-to-device communication technologies in internet of things (IoT). Ad Hoc Networks 57:52–62CrossRef Bello O, Zeadally S, Badra M (2017) Network layer inter-operation of device-to-device communication technologies in internet of things (IoT). Ad Hoc Networks 57:52–62CrossRef
12.
Zurück zum Zitat Adelantado F et al (2017) Understanding the limits of LoRaWAN. IEEE Commun Mag 55(9):34–40CrossRef Adelantado F et al (2017) Understanding the limits of LoRaWAN. IEEE Commun Mag 55(9):34–40CrossRef
15.
16.
Zurück zum Zitat Nayak P (2017) Internet of things services, applications, issues, and challenges. Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures. IGI Global, pp 353–368 Nayak P (2017) Internet of things services, applications, issues, and challenges. Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures. IGI Global, pp 353–368
17.
Zurück zum Zitat Wu F et al (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell HumIzed Comput 8(1), 101–116CrossRef Wu F et al (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell HumIzed Comput 8(1), 101–116CrossRef
18.
Zurück zum Zitat Hassanien AE (2006) Hiding iris data for authentication of digital images using wavelet theory. Pattern Recognit Image Anal 16(4):637–643CrossRef Hassanien AE (2006) Hiding iris data for authentication of digital images using wavelet theory. Pattern Recognit Image Anal 16(4):637–643CrossRef
19.
Zurück zum Zitat Lopez J et al (2017) Evolving privacy: from sensors to the internet of things. Futur Gener Comput Syst 75:46–57CrossRef Lopez J et al (2017) Evolving privacy: from sensors to the internet of things. Futur Gener Comput Syst 75:46–57CrossRef
20.
Zurück zum Zitat Hassanien AE (2006) A copyright protection using watermarking algorithm. Informatica 17(2):187–198 Hassanien AE (2006) A copyright protection using watermarking algorithm. Informatica 17(2):187–198
21.
Zurück zum Zitat Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018 Oct) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl. https://doi.org/10.1007/s00521–018-3801-x Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018 Oct) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl. https://​doi.​org/​10.​1007/​s00521–018-3801-x
22.
23.
Zurück zum Zitat Durairaj M, Muthuramalingam K (2018) A New authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. Int J Eng Technol, 7(2.26):119–124CrossRef Durairaj M, Muthuramalingam K (2018) A New authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. Int J Eng Technol, 7(2.26):119–124CrossRef
27.
Zurück zum Zitat Karthikeyan K, Sunder R, Shankar K, Lakshmanaprabu SK, Vijayakumar V, Elhoseny M, Manogaran G (2015) Energy consumption analysis of virtual machine migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput. https://doi.org/10.1007/s11227–018-2583-3 Karthikeyan K, Sunder R, Shankar K, Lakshmanaprabu SK, Vijayakumar V, Elhoseny M, Manogaran G (2015) Energy consumption analysis of virtual machine migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput. https://​doi.​org/​10.​1007/​s11227–018-2583-3
28.
Zurück zum Zitat Simplicio Jr MA et al (2017) Lightweight and escrow-less authenticated key agreement for the internet of things. Comp. Communications 98:43–51 Simplicio Jr MA et al (2017) Lightweight and escrow-less authenticated key agreement for the internet of things. Comp. Communications 98:43–51
29.
Zurück zum Zitat Shen, H et al (2017) Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wirel Pers Commun 96(4):5253–5266CrossRef Shen, H et al (2017) Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wirel Pers Commun 96(4):5253–5266CrossRef
30.
Zurück zum Zitat Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130CrossRef Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130CrossRef
31.
Zurück zum Zitat Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circuits, Syst Comput 25(11):1650138CrossRef Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circuits, Syst Comput 25(11):1650138CrossRef
32.
Zurück zum Zitat Shankar K, Eswaran P (2015) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163 Shankar K, Eswaran P (2015) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163
33.
Zurück zum Zitat Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International conference on intelligent systems and control (ISCO), IEEE, page(s): 369–374 Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International conference on intelligent systems and control (ISCO), IEEE, page(s): 369–374
34.
Zurück zum Zitat Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(55):1841–1845 Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(55):1841–1845
35.
Zurück zum Zitat Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714 Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714
Metadaten
Titel
A Lightweight Multi-level Encryption Model for IoT Applications
verfasst von
M. Durairaj
K. Muthuramalingam
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-16837-7_2

Premium Partner