Design and Implement Technique for Security of IoT-5G System using RSA Algorithm

Authors

  • Pratik Shah Research Scholar, Dr. A. P. J. Abdul Kalam University, Indore and Department of Computer Science and Engineering
  • Deepika Pathak Research Supervisor, Dr. A. P. J. Abdul Kalam University, Indore and Department of Computer Science and Engineering

Keywords:

Wireless, Communication, Migrate, Security, Automation, IoT-5G, Boltzmann Machine

Abstract

IoT stands for Internet of Things. The aim behind the development of IoT is to create a network  of several objects and devices that are well connected with each other through wireless or wired Internet to exchange data with one another and to perform any action based on the received input. In today’s era IoT is providing social as well as economic growth to country by developing several products and application. It provides applications and services in various areas like manufacturing, monitoring environment, food processing, transport, security, health care and surveillance. These applications and services are well connected with networking, cloud computing, decision making, data security, decision making and machine to machine communication. There are several characteristics and advantages of IoT but there are some disadvantages and threats also exist with this technology. IoT devices are not secured and can be easily hacked or malfunction because a cyber attacker can send a virus to the device and the device could be damaged or may perform certain wrong operations as a result huge loss may occurs. Well known threats related to IoT and Computer Networks are Denial of Service attack, Chosen Cipher text attacks, Distributed Denial of Service attack, Man in the Middle attack etc. While designing such solutions for IoT, one must consider that these devices have less storage capacity and lesser processing speed. Hence the design of the solution must be light and have extra strong cryptography. In this paper following tasks have been performed to achieve data security goals for IoT-5G. Boltzmann Machine is used to generate secured keys. Its performance is compared with other methods to generate keys, encryption and decryption time. Performance Enhancement of RSA algorithm have been done and further it’s performance is compared with existing versions of RSA. During result analysis it is found that the above methodology works better than existing solutions.

Downloads

Download data is not yet available.

References

E. Leloglu, "A Review of Security Concerns in Internet of Things," Journal of Computer and Communications, vol. 5, pp. 121-136, 2017.

J. Singh, T. Pasquier, J. Bacon, H. Ko and D. Eyers, "Twenty Security Considerations for Cloud-supported Internet of Things," IEEE Internet of things Journal, vol. 3, pp. 126-134 2016.

X. Huang, P. Craig and H. Y. Lin, "SecIoT: A Security Framework for the Internet of Things,” IEEE Internet of things Journal, vol. 9, pp. 3083-3094, 2015.

M. Mohammadi, M. Aledhari, A. Al-Fuqaha, M. Guizani and M. Ayyash, "Internet of Things: A Survey on Enabling," IEEE Explore, vol. 2, pp. 138-142, 2015.

L. Atzori, A. Iera and G. Morabito, "The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, pp. no. 3594-3608, 2012.

R. Zejun, L. Xiangang, Y. Runguo and Z. Tao, "Security and privacy on internet of things," in Electronics Information and Emergency Communication (ICEIEC), 7th IEEE International Conference, July 2017, pp. 150-156.

Z. Zhang and Q. Wen, "Application of dynamic variable cipher security certificate in internet of things," in International Conference on Cloud Computing and Intelligent Systems (CCIS), July 2012, pp. 203-209.

K. Zhao and L. Geo, "A survey on the internet of things security," in International Conference on Computational Intelligence and Security (CIS), August – 2013, pp. 663-667.

H. Suo, W. Zou, and C. Liu, "Security in the Internet of Things: A Review," IEEE International Conference on Computer Science and Electronics Engineering, March 2012, pp. 23-25.

T. Nguyen and K. Laurent, "Survey on Secure Communication," Protocols for the Internet of Things. Ad Hoc Networks, vol. 32, pp. 17- 31, 2015.

A. Arseni, S. Halunga, S. Fratu and O. Vulpe, "Analysis of the Security Solutions Implemented in Current Internet of Things Platforms," in IEEE Conference on Grid, Cloud & High Performance Computing in Science, Romania, October 2015, pp. 28-30.

A. Tahir, M. Maier and A. Fernando, "A novel IC Metric based framework for securing the Internet of Things," in IEEE International Conference on Consumer Electronics, August 2016, pp. 469-470.

C. Zhang and C. Liu, "A Novel Approach to IoT Security Based on Immunology," in Ninth International Conference on Computational Intelligence and Security, August 2013, pp. 316-322.

C. Zhou, "Multimedia traffic security architecture for the internet of things," IEEE Explore, vol. 25, pp. 35-40, 2011.

Rose, "Security meets nanoelectronics for Internet of things," in International Great Lakes Symposium on VLSI, May 2016, pp. 356-362.

L. Santos, F. Guimaraes and C. Rodrigues, "A DTLS based security architecture for the Internet of Things," in IEEE Symposium on Computers and Communication, 2015, pp. 482-486.

B. Carminati, E. Ferrari and M. Viviani, “Security and Trust in Online Social Networks,” Synthesis Lectures on Information Security, Privacy, and Trust, Vol. 6, pp. 163-172, 2021.

H. Gunasinghe and E. Bertino, “RahasNym: Protecting against Linkability in the Digital Identity Ecosystem,” 35th IEEE International Conference on Distributed Computing Systems, USA, June 2015, pp. 365-375.

H. Gunasinghe, A. Kundu, E. Bertino, H. Krawczyk, S. Chari, K. Singh and D. Su, “PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets,” in The World Wide Web Conference, USA, May 2019, pp. 456-461.

A. Barth, A. Datta, J. C. Mitchell and H. Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,” in IEEE Symposium on Security and Privacy, USA, May 2006.

R.V. Nehme, E. A. Rundensteiner and E. Bertino, “A Security Punctuation Framework for Enforcing Access Control on Streaming Data,” in 24th International Conference on Data Engineering, Mexico, March 2008, pp. 376-389.

E. Bertino, “Security and Privacy in the IoT,” in 13th International Conference Inscrypt China, November 2017, pp. 10726-10732.

E. Bertino, “Data Security and Privacy in the IoT,” in 19th International Conference on Extending Database Technology, France, March 2016, pp. 898-912.

J. Sametinger, J. W. Rozenblit, R. L. Lysecky and P. Ott, “Security Challenges for Medical Devices,” Communications of ACM, Vol. 58, pp. 74-82, 2015.

J. Valente and A. S. Cardenas, “Security & Privacy in Smart Toys,” in International Conference on Internet of Things Security and Privacy, USA, November 2017, pp. 1026-1031.

Y. Shoshitaishvili, R. Wang, C. Hauser, C. Kruegel and G. Vigna, “Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware,” in 22nd Annual Network and Distributed System Security Symposium, USA, February 2015, pp. 236-242.

M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in ACM SIGSAC Conference on Computer and Communications Security, March 2016, pp. 308–318.

E. M. Newton, L. Sweeney, and B. Malin, “Preserving privacy by deidentifying

59. face images,” IEEE transactions on Knowledge and Data Engineering, vol. 17, pp. 232–243, 2005.

K. W. Bowyer, “Face recognition technology: security versus privacy,” IEEE Technology and society magazine, vol. 23, pp. 9–19, 2004.

L. L. Gremillion, “Designing a bloom filter for differential file access,” Communications of the ACM, vol. 25, pp. 600–604, 2021.

L. Tan and N. Wang, “Future internet: The internet of things,” in 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 370–376.

A. Gupta and N. K. Walia, “Cryptography algorithms: A review,'' International Journal of Engineering Research and Development, 2014, vol. 2, pp. 1667-1672.

J. A. Stankovic, “Research directions for the internet of things,” IEEE Internet of Things Journal, vol. 1, pp. 3–9, 2014.

C. W. Tsai, C. F. Lai, and A. V. Vasilakos, “Future Internet of Things: open issues and challenges,” Wireless Networks, vol. 20, pp. 2201–2217, 2014.

A. Rehash, R. Pavitra, E. Srie, V. Janani, and P. G. Scholar, “Low Delay and High Throughput Data Collection in Wireless Sensor Networks with Mobile Sinks,” International Journal of Scientific Engineering and Research, vol. 8, pp. 589-595, 2017.

J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang, “Research on social relations cognitive model of mobile nodes in Internet of Things,” Journal of Network and Computer Applications, vol. 36, pp. 799–810, 2013.

W. Ji, L. Li, and W. Zhou, “Design and implementation of a RFID Reader/Router in RFID-WSN hybrid system,” Future Internet, vol. 10, pp. 798-810, 2018.

D. He and S. Zeadally, “An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography,” IEEE Internet of Things Journal, vol. 2, pp. 72–83, 2015.

K. Demestichas, N. Peppes, and T. Alexakis, “Survey on security threats in agricultural IoT and smart farming,” Sensors (Switzerland), vol. 20, pp. 1–17, 2020.

P. R. Lutui, B. Cusack, and G. Maeakafa, “Energy efficiency for IoT devices in home environments,” in IEEE International Conference on Environmental Engineering, June 2018, pp. 1–6.

M. Khosyi‘in, S. A. D. Prasetyowati, Z. Nawawi, and B. Y. Suprapto, “Review and design of GPS-RFID localization for autonomous vehicle navigation,” in ACM International Conference Proceeding Series, Sep. 2019, pp. 42–46.

M. G. Gnoni, V. Elia, and A. Rollo, “RFID technology for an intelligent public transport network management,” International Journal of RF Technologies: Research and Applications, vol. 3, pp. 1–13, 2012.

H. Farhat, P. Iliev, P. Marriage, and N. Rolland, “An added value alternative to RAIN RFID items characterization in retail,” IEEE Access, vol. 6, pp. 32430–32439, 2018.

B. Khoo, “RFID as an enabler of the internet of things: Issues of security and privacy,” in IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing ,2011, pp. 709–712.

M. Faheem, S. Jamel, A. Hassan, Z. A., N. Shafinaz, and M. Mat, “A Survey on the Cryptographic Encryption Algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, pp. 116-124, 2017.

A. Maity, R. Ghosh and S. Bhadra, "Image Encryption Using RSA and Advanced Caesar Cipher Method," in International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC), Bhubaneswar, India, 2022, pp. 1-5.

I. R. Jeong, J. O. Kwon and D. H. Lee, "Strong Diffie-Hellman-DSA Key Exchange," IEEE Communications Letters, vol. 11, pp. 432-433, 2007.

T. D. Nguyen, T. D. Nguyen and L. D. Tran, "Attacks on Low Private Exponent RSA: An Experimental Study," in 13th International Conference on Computational Science and Its Applications, Ho Chi Minh City, Vietnam, 2013, pp. 162-165.

K. Kwon, D. Kim, S. Park and J. Kim, "EPA ECC: Error-Pattern-Aligned ECC for HBM2E," in International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC), Jeju, Korea, Republic of, 2023, pp. 1-6.

R. Sankar, T. Subashri and V. Vaidehi, "Implementation and integration of efficient ECDH key exchanging mechanism in software-based VoIP network," in International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, 2011, pp. 124-128.

Qing Liu, Yunfei Li, Lin Hao and Hua Peng, "Two efficient variants of the RSA cryptosystem," International Conference on Computer Design and Applications, Qinhuangdao, 2010, pp. 550-553.

K. Pavani and P. Sriramya, "Enhancing Public Key Cryptography using RSA, RSA-CRT and N-Prime RSA with Multiple Keys," in Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 2021, pp. 1-6.

A. Karakra and A. Alsadeh, "A-RSA: Augmented RSA," 2016 SAI Computing Conference (SAI), London, UK, 2016, pp. 1016-1023.

Downloads

Published

06.01.2024

How to Cite

Shah , P. ., & Pathak, D. . (2024). Design and Implement Technique for Security of IoT-5G System using RSA Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 656–674. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4487

Issue

Section

Research Article