Indian Journal of Science and Technology
Year: 2017, Volume: 10, Issue: 1, Pages: 1-9
V. Kamalakannan1*, S. Tamilselvan2
1,2Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry, India
*Author for correspondence:
Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry, India
Background: Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. As the technologies are developing huge amount of information are exchanged with each other which increases the demand of a secure encryption standards.
Objectives: To protect the information transmission between nodes in the perceptual layer of IoT, security is to be enhanced such that the Men in Middle (MIM) attack of information by intruders in the communication link is not possible.
Methods/Statistical analysis: The security method is implemented using the concept of symmetric, asymmetric and hash algorithms between the sender and receiver. Elliptic Curve Cryptography (ECC) is performed for encrypting and sharing the Advanced Encryption Standard (AES) secret key between the sender and receiver. Elliptic Curve digital signature are added with the encrypted data for validation in transmission. Secured Hash Algorithm (SHA) is considered for generating Elliptical Curve Digital Signature Algorithm (ECDSA). All the algorithms are combined to enhance the security.
Findings: Elliptic Curve Cryptography is generally applied for encrypting and sharing the secret key between the sender and receiver when Advanced Encryption Standard is used for encryption/decryption of data. A highly efficient architectures for asymmetric key encryption is applied with symmetric key encryption for encrypting the data transmitted between the devices present in the perceptual layers in the IoT. Due to security issues NIST selected SHA-3 Keccak-f algorithm. An authentication process based on ECC is applied to perceptual layer involving initialization and authentication phase apart from encryption and signature generation. Sender combines the encrypted data and key with signature together before transmitting to the receiver. The receiver verifies the signature and decrypts the key and obtains original information. Hence it is very difficult for the man in middle to access the information exchanged between the Perceptual Layer devices.
Application/Improvements: This generally doesn’t require an innovative technique but an approach to develop the method implemented successfully in the perceptual layer of Internet of Things. The key is encrypted and decrypted using a novel ECC algorithm with improved ECDSA.
Keywords: Elliptical Curve Cryptography (ECC), Elliptic Curve Digital Signature Algorithm (EDSA), Internet of Things (IoT), Keccak, Perception Layer, Secured Hash Algorithm (SHA)
Subscribe now for latest articles and news.