Research Article
BibTex RIS Cite
Year 2020, , 476 - 488, 30.12.2020
https://doi.org/10.36222/ejt.702563

Abstract

References

  • [1]Windpowerengineeringdevelopment,(2018). https://www.windpowerengineering.com/global-iot-market-to-reach-318-billion-by-2023-says-globaldata/.
  • [2] Tuen, Christian Dancke., Security in Internet of Things Systems, MSc thesis, NTNU, 2015.
  • [3] Yousefi, Afsoon, and Seyed Mahdi Jameii. (2017). Improving the security of internet of things using encryption algorithms. In 2017 Int. IEEE Conference on IoT and Application (ICIOT), 1-5.
  • [4] Zhengqiu, He, Xue Fangxia, Liu Wenfu, He Rongmao, and Xu Zhongfu. (2016). Research of Secure Service Composition Based on Semantic Security Policy. In 2016 IEEE Int. Conference on Internet of Things (iThings) , 246-251.
  • [5] Moh, Melody, and Robinson Raju. (2018). Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems. In 2018 International Conference on High Performance Computing & Simulation (HPCS), 709-715.
  • [6] Mosenia, Arsalan, and Niraj K. Jha. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
  • [7] Sharma, Vishal, Ilsun You, Karl Andersson, Francesco Palmieri, and Mubashir Husain Rehmani. (2019). Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. arXiv preprint arXiv:1903.05362.
  • [8] Su, Xin, Ziyu Wang, Xiaofeng Liu, Chang Choi, and Dongmin Choi. (2018). Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. Security and Communication Networks.
  • [9] F. Olivier, G. Carlos, N.Florent. (2015). New Security Architecture for IoT Network”, Procedia Computer Science, 52, 1028-1033.
  • [10] M.Xin, H.China. (2015). A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System. In IEEE Int. Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery ,Xian,62-65.
  • [11] H.Shafagh, A.Hithnawi. (2014). Poster Abstract: Security Comes First, A Public key Cryptography Framework for the Internet of Things. In IEEE Int. Conference on Distributed Computing In Sensor Systems (DCOSS), Marina Del Rey, CA, 135-136.
  • [12] A.F.Skarmeta, J.L. Hernandez, M.V. Moreno. (2014). A decentralized approach for Security and Privacy challenges in the Internet of Things. In IEEE Word Forum on Internet of Things (WF-IOT), Seoul, 67-72.
  • [13] N.Hong, Z.Xuefeng. (2013). A Security Framework for internet of things based on SM2 cipher algorithm. Fifth IEEE Int. Conf. on Computer Science and Network Technology, Shiyang, China,13-16.
  • [14] R.Arbia, Ya. Challal, E.Natalizio, Z.Chtourou, and A. Bouabdallah. (2013). A systemic approach for IoT security. In 2013¬ IEEE Int. Conf. on Distributed Computing in Sensor Systems, 351-355.
  • [15] L.yuan Zeng. (2012). A Security Framework for Internet of Things Based on 4G communication. 2nd IEEE Int. Conference On computer Science And Network Technology, Chanchun, China,1715- 1718.
  • [16] S. Babar, A.Stango, N.Prasad, J.Sen, R.Prasad. (2011). Proposed embedded security framework for internet of things. 2nd IEEE Int.l Conf. on Information Theory and Aerospace & Electronics Systems Technology, Chennai,1-5.
  • [17] K.Nur Prasetyo ST, Y. Purwanto, and D. Darlis. (2014). An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA. In 2nd IEEE Int. Conference Information and Communication Technology (ICoICT), Bandung, 75-79.
  • [18] SB. Vinayaga, M. Ramnath, M. Prasanth, and V. Sundaram. (2015). Encryption and hash based security in Internet of Things. In IEEE int. Conf. on Signal Processing, Communication and Networking (ICSCN), Chennai, 1-6.
  • [19] P.Xu, Li .Min, and He. Yu-Jie. (2013). A hybrid encryption algorithm in the application of equipment information management based on Internet of things. In 3rd International Conference on Multimedia Technology (ICMT-13). Atlantis Press.
  • [20] X. Yi Chen, Zh.Gang Jin. (2012). Research on Key Technology and Applications for Internet of Things. Physics Procedia, 33(Science Direct), 561-566.
  • [21] R.Wuling, and Zh. Miao. (2010). A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In IEEE Int. Conf. on Modeling, Simulation and Visualization Methods (WMSVM), Sanya, 221-225.
  • [22] Safi, Amirhossein. (2017). Improving the security of Internet of things using encryption algorithms. World Acad Sci Eng Technol Int J Comput Electr Autom Control Inf Eng. 11(5), 546-549.
  • [23] C. E. Shannon. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.
  • [24] S. S. Agaian, R. G. R. Rudraraju, and R. C. Cherukuri. (2010). Logical transform-based encryption for multimedia systems. in Proc. of the IEEE Int. Conference on Systems, Man and Cybernetics (SMC ’10), 1953–1957.

SECURITY IMPROVEMENTS OF INTERNET OF THINGS SYSTEMS

Year 2020, , 476 - 488, 30.12.2020
https://doi.org/10.36222/ejt.702563

Abstract

In this paper, we discuss the security of the Internet of Things (IoT) which needs to utilize particular algorithms in order to offer low power consumption and a long lifespan, along with other parameters such as strong immunity against attacks, lower execution time and acceptable performance. The present work considers a simple lightweight security encryption algorithm (LSEA) to be compatible with IoT systems, named (LSEA-IoT) for improving the security issue in IoT devices. The new LSEA-IoT scheme has be implemented for encrypting texts and images data and several tests such as visual checking, histogram diagrams, entropy and correlation analyses are carried out in order to ensure the suitability of the LSEA algorithm. Simulation results show that the performance of LSEA based IoT scheme achieves acceptable security level in terms of histogram, entropy and correlation performances as well as it has a good execution time performance for different types of messages. Based on this analysis, it can be concluded that the proposed LSEA-IOT is a promising algorithm and can be considered as an appropriate nominee to be utilized for IoT devices and it can be used for real-time applications.

References

  • [1]Windpowerengineeringdevelopment,(2018). https://www.windpowerengineering.com/global-iot-market-to-reach-318-billion-by-2023-says-globaldata/.
  • [2] Tuen, Christian Dancke., Security in Internet of Things Systems, MSc thesis, NTNU, 2015.
  • [3] Yousefi, Afsoon, and Seyed Mahdi Jameii. (2017). Improving the security of internet of things using encryption algorithms. In 2017 Int. IEEE Conference on IoT and Application (ICIOT), 1-5.
  • [4] Zhengqiu, He, Xue Fangxia, Liu Wenfu, He Rongmao, and Xu Zhongfu. (2016). Research of Secure Service Composition Based on Semantic Security Policy. In 2016 IEEE Int. Conference on Internet of Things (iThings) , 246-251.
  • [5] Moh, Melody, and Robinson Raju. (2018). Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems. In 2018 International Conference on High Performance Computing & Simulation (HPCS), 709-715.
  • [6] Mosenia, Arsalan, and Niraj K. Jha. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
  • [7] Sharma, Vishal, Ilsun You, Karl Andersson, Francesco Palmieri, and Mubashir Husain Rehmani. (2019). Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. arXiv preprint arXiv:1903.05362.
  • [8] Su, Xin, Ziyu Wang, Xiaofeng Liu, Chang Choi, and Dongmin Choi. (2018). Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. Security and Communication Networks.
  • [9] F. Olivier, G. Carlos, N.Florent. (2015). New Security Architecture for IoT Network”, Procedia Computer Science, 52, 1028-1033.
  • [10] M.Xin, H.China. (2015). A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System. In IEEE Int. Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery ,Xian,62-65.
  • [11] H.Shafagh, A.Hithnawi. (2014). Poster Abstract: Security Comes First, A Public key Cryptography Framework for the Internet of Things. In IEEE Int. Conference on Distributed Computing In Sensor Systems (DCOSS), Marina Del Rey, CA, 135-136.
  • [12] A.F.Skarmeta, J.L. Hernandez, M.V. Moreno. (2014). A decentralized approach for Security and Privacy challenges in the Internet of Things. In IEEE Word Forum on Internet of Things (WF-IOT), Seoul, 67-72.
  • [13] N.Hong, Z.Xuefeng. (2013). A Security Framework for internet of things based on SM2 cipher algorithm. Fifth IEEE Int. Conf. on Computer Science and Network Technology, Shiyang, China,13-16.
  • [14] R.Arbia, Ya. Challal, E.Natalizio, Z.Chtourou, and A. Bouabdallah. (2013). A systemic approach for IoT security. In 2013¬ IEEE Int. Conf. on Distributed Computing in Sensor Systems, 351-355.
  • [15] L.yuan Zeng. (2012). A Security Framework for Internet of Things Based on 4G communication. 2nd IEEE Int. Conference On computer Science And Network Technology, Chanchun, China,1715- 1718.
  • [16] S. Babar, A.Stango, N.Prasad, J.Sen, R.Prasad. (2011). Proposed embedded security framework for internet of things. 2nd IEEE Int.l Conf. on Information Theory and Aerospace & Electronics Systems Technology, Chennai,1-5.
  • [17] K.Nur Prasetyo ST, Y. Purwanto, and D. Darlis. (2014). An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA. In 2nd IEEE Int. Conference Information and Communication Technology (ICoICT), Bandung, 75-79.
  • [18] SB. Vinayaga, M. Ramnath, M. Prasanth, and V. Sundaram. (2015). Encryption and hash based security in Internet of Things. In IEEE int. Conf. on Signal Processing, Communication and Networking (ICSCN), Chennai, 1-6.
  • [19] P.Xu, Li .Min, and He. Yu-Jie. (2013). A hybrid encryption algorithm in the application of equipment information management based on Internet of things. In 3rd International Conference on Multimedia Technology (ICMT-13). Atlantis Press.
  • [20] X. Yi Chen, Zh.Gang Jin. (2012). Research on Key Technology and Applications for Internet of Things. Physics Procedia, 33(Science Direct), 561-566.
  • [21] R.Wuling, and Zh. Miao. (2010). A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In IEEE Int. Conf. on Modeling, Simulation and Visualization Methods (WMSVM), Sanya, 221-225.
  • [22] Safi, Amirhossein. (2017). Improving the security of Internet of things using encryption algorithms. World Acad Sci Eng Technol Int J Comput Electr Autom Control Inf Eng. 11(5), 546-549.
  • [23] C. E. Shannon. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.
  • [24] S. S. Agaian, R. G. R. Rudraraju, and R. C. Cherukuri. (2010). Logical transform-based encryption for multimedia systems. in Proc. of the IEEE Int. Conference on Systems, Man and Cybernetics (SMC ’10), 1953–1957.
There are 24 citations in total.

Details

Primary Language English
Subjects Electrical Engineering
Journal Section Research Article
Authors

Fouad Abdulkafı This is me 0000-0002-0002-7137

Sefer Kurnaz 0000-0002-7666-2639

F Atiyah Abdulkafı 0000-0002-1160-6011

Publication Date December 30, 2020
Published in Issue Year 2020

Cite

APA Abdulkafı, F., Kurnaz, S., & Abdulkafı, F. A. (2020). SECURITY IMPROVEMENTS OF INTERNET OF THINGS SYSTEMS. European Journal of Technique (EJT), 10(2), 476-488. https://doi.org/10.36222/ejt.702563

All articles published by EJT are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı