ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Novel Technique for Securing IoT Systems by using Multiple ECC and Ceaser Cipher Cryptography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 2)

Publication Date:

Authors : ; ;

Page : 1-8

Keywords : Cryptography; Internet of Things; Multi Curve ECC; Elliptic Curve Cryptography; Ceaser Cipher Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly solely dependent on this technology for comfort and easy life style. Any security compromise of the system will directly affect human life. Privacy and security in IoT, is proven one of the most challenging areas. As we know that, the IoT devices have constraints like low power and less computational speed and the traditional encryption algorithm seems not feasible for IoT devices. So, we need to develop Lightweight encryption algorithm for IoT devices for secure communication and secure data transmission in IoT environment. Current cryptographic models and security schemes are based on widely adopted encryption algorithms, and privacy standards. Confidentiality is ensured in most of the cases with Advanced Encryption Standard (AES). Alternatively, Diffie-Hellman (DH) and Multi Curve Elliptic Curve Cryptography (ECC) supplement the privacy schemes, basically in asymmetric cryptography. Since the applicability of these cryptographic models and security schemes is a little bit unclear, detailed analysis is needed, in order to be ensured, that they can be implemented in the specified resources of IoT. Especially in the case, of minimized capabilities of hand-held and portable devices another very important and effective cryptographic technique can be used is Novel Caesar cipher method is the public key cryptography technique. This method includes two statics (i.e. encryption and decryption). Encryption on Ceaser cipher changes the word in the text with another word and original text is replaced with another word. Then the cipher text can be generated. In order to achieve better results, there is an ongoing research for more flexible cryptographic suites. Special interest has been attracted by the security schemes of combined mode that supports probably encryption and authentication.

Last modified: 2021-02-08 19:43:43