Skip to main content

Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things

  • Conference paper
  • First Online:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10618))

  • 1687 Accesses

Abstract

Security represents a vital element for sanctioning the widespread adoption of Internet of Things technologies and applications. While not guarantees in terms of system-level confidentiality, credibility and privacy the relevant stakeholders are unlikely to adopt Internet of Things solutions on an oversized scale. In early-stage Internet of Things deployments (e.g., supported RFIDs only), security solutions have principally been devised in an advert hoc approach. This comes from the very fact that such deployments were sometimes vertically integrated, with all elements beneath the management of one body entity during this work we have a tendency to propose a brand new dynamic cipher to access quite one device at the same time during a network employing a single controller by creating use of Dynamic variable cipher security certificate protocol. This protocol uses key matrices thought during this protocol we have a tendency to create use of key matrices and store same key matrix the least bit the human action nodes. So once plain text is encrypted to cipher text at the causing facet, the sender transmits the cipher text while not the key that’s to be won’t to decode the message. To access more than one device simultaneously in a network using a single controller by making use of Dynamic variable cipher security certificate protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Kopetz, H.: Internet of Things. Real-Time Systems, pp. 307–323. Springer, Heidelberg (2011). doi:10.1007/978-1-4419-8237-7

    Google Scholar 

  • Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004). doi:10.1007/978-3-540-28632-5_26

    Chapter  Google Scholar 

  • Smith, D.R., Palmer, J.T.: Universal fixed messages and the Rivest-Shamir-Adleman cryptosystem. Mathematika 26(01), 44–52 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  • Jara, A.J., Lopez, P., Fernandez, D., Castillo, J.F., Zamora, M.A., Skarmeta, A.F.: Mobile digcovery: discovering and interacting with the world through the internet of things. Pers. Ubiquit. Comput. 18(2), 323–338 (2014)

    Article  Google Scholar 

  • Xingmei, X., Jing, Z., He, W.: Research on the basic characteristics, the key technologies, the network architecture and security problems of the internet of things. In: 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT), pp. 825–828. IEEE (2013)

    Google Scholar 

  • Lee, J., Oh, S., Jang, J.W.: A work in progress: context based encryption scheme for internet of things. Proc. Comput. Sci. 56, 271–275 (2015)

    Article  Google Scholar 

  • Lee, J.J., Hong, Y.-S., Lee, K.Y.: An authentication scheme based on elliptic curve cryptosystem and openID in the internet of things. In: Proceedings of the International Conference on Security and Management (SAM), p. 192. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2015)

    Google Scholar 

  • Peretti, G., Lakkundi, V., Zorzi, M.: BlinkToSCoAP: an end-to-end security framework for the internet of things. In: 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pp. 1–6. IEEE (2015)

    Google Scholar 

  • Hochleitner, C., Graf, C., Unger, D., Tscheligi, M.: Making devices trustworthy: security and trust feedback in the internet of things. In: Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), Newcastle, UK (2012)

    Google Scholar 

  • Van Deursen, T., Radomirovic, S.: Attacks on RFID protocols. IACR Cryptol. ePrint Arch. 2008, 310 (2008)

    Google Scholar 

  • Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651. IEEE (2012)

    Google Scholar 

  • Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 3, pp. 1062–1066. IEEE (2012)

    Google Scholar 

  • Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlin. Sci. Numer. Simul. 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  • He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlin. Dyn. 69(3), 1149–1157 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  • Botta, A., de Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  • Marin, L., Pawlowski, M.P., Jara, A.: Optimized ECC implementation for secure communication between heterogeneous IoT devices. Sensors 15(9), 21478–21499 (2015)

    Article  Google Scholar 

  • Hemalatha, D., Afreen, B.E.: Development in RFID (radio frequency identification) technology in internet of things (IOT). Development 4(11) (2015)

    Google Scholar 

  • Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  • Whitmore, A., Agarwal, A., Da Xu, L.: The internet of things—a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)

    Article  Google Scholar 

  • Shafagh, H.: Toward computing over encrypted data in IoT systems. XRDS Crossroads: ACM Mag. Stud. 22(2), 48–52 (2015)

    Google Scholar 

  • Bohli, J.-M., Kurpatov, R., Schmidt, M.: Selective decryption of outsourced IoT data. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 739–744. IEEE (2015)

    Google Scholar 

  • Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)

    Article  Google Scholar 

  • Shafagh, H., Hithnawi, A., Dröscher, A., Duquennoy, S., Hu, W.: Poster: towards encrypted query processing for the internet of things. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 251–253. ACM (2015)

    Google Scholar 

  • Shi, W., Kumar, N., Gong, P., Chilamkurti, N., Chang, H.: On the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw. Appl. 8(5), 881–885 (2015)

    Article  Google Scholar 

  • Patil, A., Bansod, G., Pisharoty, N.: Hybrid lightweight and robust encryption design for security in IoT (2015)

    Google Scholar 

  • Kim, H., Kim, K.: Toward an inverse-free lightweight encryption scheme for IoT. In: 2014 Conference on Information Security and Cryptography (2014)

    Google Scholar 

  • Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, January 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paramjeet Cheema .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Cheema, P., Julka, N. (2017). Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things. In: Traore, I., Woungang, I., Awad, A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science(), vol 10618. Springer, Cham. https://doi.org/10.1007/978-3-319-69155-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69155-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69154-1

  • Online ISBN: 978-3-319-69155-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics