Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices

被引:0
|
作者
Kosciug, Bartosz [1 ]
Bilski, Piotr [1 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
-Power optimization; Security protocols; Applica-tion layer protocols; Machine to machine communication; IoT;
D O I
10.24425/ijet.2023.144358
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energy -efficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices. vast as 2kB as RAM) the implementation
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [21] Token-based authentication method for M2M platforms
    Polat, Huseyin
    Oyucu, Saadin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (04) : 2956 - 2967
  • [22] ID-based Communication for Realizing IoT and M2M in Future Heterogeneous Mobile Networks
    Kafle, Ved P.
    Fukushima, Yusuke
    Harai, Hiroaki
    2015 INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INTERNET OF THINGS (RIOT), 2015,
  • [23] Energy Efficient Uplink MAC Protocol for M2M Devices
    Ali, Anum
    Shah, Ghalib A.
    Shoaib, Muhammad
    IEEE ACCESS, 2019, 7 : 35952 - 35962
  • [24] Optimal Resource allocation in NOMA-based M2M communication using Hybrid Rider Optimization with FireFly: Power Saving Strategy of IoT
    Selvam, K.
    Kumar, K.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (12)
  • [25] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [26] Energy Management in Smart Buildings by Using M2M Communication
    Chaouch, Haithem
    Bayraktar, Abdullah Salih
    Ceken, Celal
    2019 7TH INTERNATIONAL ISTANBUL SMART GRIDS AND CITIES CONGRESS AND FAIR (ICSG ISTANBUL 2019), 2019, : 31 - 35
  • [27] Cloud-IoT Integration: Cloud Service Framework for M2M Communication
    Malik, Saadia
    Tabassum, Nadia
    Saleem, Muhammad
    Alyas, Tahir
    Hamid, Muhammad
    Farooq, Umer
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01): : 471 - 480
  • [28] A Joint Energy-Saving Mechanism for M2M Communications in LTE-based System
    Sun, Linlin
    Tian, Hui
    Xu, Lingling
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4706 - 4711
  • [29] Using M2M Communication for Shaving Peak of Energy Demand
    Dridi, Rahma Ajmi
    Slama, Jaleleddine Ben Hadj
    2014 5TH INTERNATIONAL RENEWABLE ENERGY CONGRESS (IREC), 2014,
  • [30] Design of an Improved Energy Efficient Clustering in M2M Communication
    Deshpande, Kartik Vishal
    Rajesh, A.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,