Confidentiality and Integrity of Sensing Data Transmission in IoT Application

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    In the last few years the Internet of Things (IoT) has been developing new ways expected to connect billions of devices in different application of life. The increased numbers of connected devices arе еssеntially smallеr in sizе and low powеrеd may be led to generate big data and face the security of data that transmitted. This paper proposed two types of security service for an IoT smart home application, the first security service is confidently which achieved by encrypting all data that sensor send to IoT server using AES-GCM or RSA-OAEP encryption algorithm moreover second security service is integrity all data that sensor send to IoT server which achieved using SHA3-512 encryption algorithm. In order to validate the security of sensor data results, we first had to implement the smart home application which consists of raspberry pi 3 and four sensors, the evaluation result shown a shorter average time 3ms when using AES-GCM algorithm whereas the RSA-OAEP algorithm had taken about 9ms, furthermore the integrity service had taken about 25% of encryption time.



  • Keywords

    Confidentiality, Integrity, Internet of things, Sensor Data, Encryption Algorithm

  • References

      [1] I. C. L. Ng and S. Y. L. Wakenshaw, “The Internet-of-Things: Review and research directions,” Int. J. Res. Mark., vol. 34, no. 1, pp. 3–21, 2017.

      [2] H. Javdani and H. Kashanian, “Internet of things in medical applications with a service-oriented and security approach: a survey,” Health Technol. (Berl)., vol. 8, no. 1–2, pp. 39–50, 2018.

      [3] I. Yaqoob et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Comput. Networks, vol. 129, pp. 444–458, 2017.

      [4] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, “IoT Middleware: A Survey on Issues and Enabling Technologies,” IEEE Internet Things J., vol. 4, no. 1, pp. 1–20, 2017.

      [5] L. Chen, “Security Management for The Internet of Things,” ProQuest Diss. Publ., 2017.

      [6] S. Deng, “Industrial IoT Technologies and Applications,” vol. 202, pp. 102–110, 2017.

      [7] K. Bu, M. Weng, Y. Zheng, B. Xiao, and X. Liu, “You Can Clone but You Cannot Hide: A Survey of Clone Prevention and Detection for RFID,” IEEE Commun. Surv. Tutorials, vol. 19, no. 3, pp. 1682–1700, 2017.

      [8] Z. Kamal, A. Mohammed, E. Sayed, and A. Ahmed, “Internet of Things Applications, Challenges and Related Future Technologies,” WSN World Sci. News, vol. 67, no. 672, pp. 126–148, 2017.

      [9] S. El Jaouhari, A. Bouabdallah, and J. M. Bonnin, Security Issues of the Web of Things, 1st ed. Elsevier Inc., 2017.

      [10] V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommun. Syst., vol. 67, no. 3, pp. 423–441, 2018.

      [11] A. Gantait, J. Patra, and A. Mukherjee, “Design and build secure IoT solutions , Part 1 : Securing IoT devices and gateways,” IBM Dev., no. May, pp. 1–20, 2016.

      [12] M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, “OSCAR: Object security architecture for the Internet of Things,” Ad Hoc Networks, vol. 32, no. January, pp. 3–16, 2015.

      [13] H. Ko, J. Jin, and S. L. Keoh, “Secure Service Virtualization in IoT by Dynamic Service Dependency Verification,” IEEE Internet Things J., vol. 3, no. 6, pp. 1006–1014, 2016.

      [14] L. Malina, J. Hajny, R. Fujdiak, and J. Hosek, “On perspective of security and privacy-preserving solutions in the internet of things,” Comput. Networks, vol. 102, pp. 83–95, 2016.

      [15] S. Tan, D. De, W.-Z. Song, J. Yang, and S. K. Das, “Survey of Security Advances in Smart Grid: A Data Driven Approach,” IEEE Commun. Surv. Tutorials, vol. 19, no. 1, pp. 397–422, 2017.

      [16] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT: A Lightweight Encryption Algorithm for Secure Internet of Things,” vol. 8, no. 1, pp. 1–10, 2017.

      [17] L. Parrilla, E. Castillo, J. A. López-Ramos, J. A. Álvarez-Bermejo, A. García, and D. P. Morales, “Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks,” Sensors (Switzerland), vol. 18, no. 1, pp. 1–22, 2018.

      [18] P. Fremantle and P. Scott, “A survey of secure middleware for the Internet of Things,” PeerJ Comput. Sci., vol. 3, p. e114, 2017.

      [19] P. Siano, G. Graditi, M. Atrigna, and A. Piccolo, “Designing and testing decision support and energy management systems for smart homes,” J. Ambient Intell. Humaniz. Comput., vol. 4, no. 6, pp. 651–661, 2013.

      [20] J. M. Batalla, A. Vasilakos, and M. Gajewski, “Secure Smart Homes: Opportunities and Challenges,” ACM Comput. Surv., vol. 50, no. 5, pp. 1–75, 2017.

      [21] A. Rayes and S. Salam, “Internet of things-from hype to reality: The road to digitization,” Internet Things From Hype to Real. Road to Digit., no. November, pp. 1–328, 2016.

      [22] Y. Challal, E. Natalizio, S. Sen, and A. M. Vegni, “Internet of Things security and privacy: Design methods and optimization,” Ad Hoc Networks, vol. 32, pp. 1–2, 2015.

      [23] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” J. Netw. Comput. Appl., vol. 84, no. January, pp. 25–37, 2017.

      [24] M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, 2018.

      [25] N. Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT Prof., vol. 19, no. 4, pp. 68–72, 2017.

      [26] D. G. Padmavathi and M. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks,” Int. J. Comput. Sci. Inf. Secur., vol. 4, no. 1, pp. 1–9, 2009.

      [27] S. Sicari, C. Cappiello, F. De Pellegrini, D. Miorandi, and A. Coen-Porisini, “A security-and quality-aware system architecture for Internet of Things,” Inf. Syst. Front., vol. 18, no. 4, pp. 665–677, 2016.




Article ID: 26931
DOI: 10.14419/ijet.v7i4.25.26931

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.