Novel Technique for Securing IoT Systems by using Multiple ECC and Ceaser Cipher Cryptography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 2)Publication Date: 2021-02-28
Authors : Ramakrishna Hegde; Soumyasri S M;
Page : 1-8
Keywords : Cryptography; Internet of Things; Multi Curve ECC; Elliptic Curve Cryptography; Ceaser Cipher Cryptography;
Abstract
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly solely dependent on this technology for comfort and easy life style. Any security compromise of the system will directly affect human life. Privacy and security in IoT, is proven one of the most challenging areas. As we know that, the IoT devices have constraints like low power and less computational speed and the traditional encryption algorithm seems not feasible for IoT devices. So, we need to develop Lightweight encryption algorithm for IoT devices for secure communication and secure data transmission in IoT environment. Current cryptographic models and security schemes are based on widely adopted encryption algorithms, and privacy standards. Confidentiality is ensured in most of the cases with Advanced Encryption Standard (AES). Alternatively, Diffie-Hellman (DH) and Multi Curve Elliptic Curve Cryptography (ECC) supplement the privacy schemes, basically in asymmetric cryptography. Since the applicability of these cryptographic models and security schemes is a little bit unclear, detailed analysis is needed, in order to be ensured, that they can be implemented in the specified resources of IoT. Especially in the case, of minimized capabilities of hand-held and portable devices another very important and effective cryptographic technique can be used is Novel Caesar cipher method is the public key cryptography technique. This method includes two statics (i.e. encryption and decryption). Encryption on Ceaser cipher changes the word in the text with another word and original text is replaced with another word. Then the cipher text can be generated. In order to achieve better results, there is an ongoing research for more flexible cryptographic suites. Special interest has been attracted by the security schemes of combined mode that supports probably encryption and authentication.
Other Latest Articles
- The Effect of Pulverized Oil Bean (Pentaclethra Macrophyllaa Benth.) Stalk Additive on the Thermo Mechanical Properties and Microstructure of 0.6ALDR0.3CMT0.05G0.05OBS Aluminium Dross Composite for Building Ceilings Applications
- Optimization of Tensile Behaviour of Alkaline Treated Banana Fiber Reinforced Cardanol Resin Composites Via Response Surface Methodology
- An Experimental Study on the Correlation between Spray Distance, Coating Thickness and Waste Reduction
- Analysis and Testing of Heat Exchanger for an Environmentally Friendly RDF Drying Machine
- Gradient Layer Structure Formation during Plasma Treatment of Wheel Steel
Last modified: 2021-02-08 19:43:43