Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices

被引:0
|
作者
Kosciug, Bartosz [1 ]
Bilski, Piotr [1 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
-Power optimization; Security protocols; Applica-tion layer protocols; Machine to machine communication; IoT;
D O I
10.24425/ijet.2023.144358
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energy -efficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices. vast as 2kB as RAM) the implementation
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [1] NB-IoT System for M2M Communication
    Ratasuk, Rapeepat
    Vejlgaard, Benny
    Mangalvedhe, Nitin
    Ghosh, Amitava
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [2] Probabilistic Model for M2M in IoT networking and communication
    Anand Paul
    Seungmin Rho
    Telecommunication Systems, 2016, 62 : 59 - 66
  • [3] Probabilistic Model for M2M in IoT networking and communication
    Paul, Anand
    Rho, Seungmin
    TELECOMMUNICATION SYSTEMS, 2016, 62 (01) : 59 - 66
  • [4] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
  • [5] A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    Esfahani, Alireza
    Mantas, Georgios
    Matischek, Rainer
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus G.
    Schmittner, Christoph
    Bastos, Joaquim
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 288 - 296
  • [6] Providing Generic Support for IoT and M2M for Mobile Devices
    Doukas, Charalampos
    Capra, Luca
    Antonelli, Fabio
    Jaupaj, Erinda
    Tamilin, Andrei
    Carreras, Iacopo
    2015 IEEE RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES - RESEARCH, INNOVATION, AND VISION FOR THE FUTURE (RIVF), 2015, : 192 - 197
  • [7] An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals
    Shi, Congcong
    Du, Miao
    Lu, Weidong
    Lu, Sanglu
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [8] Machine Learning/AI for IoT, M2M, and Computer Communication
    Yalew, Zelalem Jembre
    Ahmed, Syed Hassan
    Choi, Young-June
    Lloret, Jaime
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (09)
  • [9] A Beamforming based Wireless Energy Transmitter and Energy Harvester for IoT/M2M Applications
    Kim, Jin-sup
    Jung, Won-jae
    Hong, Nam-pyo
    Lee, Ji-hoon
    Nam, Kyu-hyun
    Jang, Peter
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1019 - 1023
  • [10] An identity based encryption using elliptic curve cryptography for secure M2M communication
    TCS Innovation Labs, Bangalore, Karnataka, India
    ACM Int. Conf. Proc. Ser., (68-74):