Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

被引:49
|
作者
Hasan, Mohammad Kamrul [1 ]
Shafiq, Muhammad [2 ]
Islam, Shayla [3 ]
Pandey, Bishwajeet [4 ]
El-Ebiary, Yousef A. Baker [5 ]
Nafi, Nazmus Shaker [6 ]
Rodriguez, R. Ciro [7 ]
Vargas, Doris Esenarro [8 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Form Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Gaungzhou, Peoples R China
[3] UCSI Univ, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
[4] Birla Inst Appl Sci, Dept Comp Sci & Engn, Bhimtal, India
[5] Univ Sultan Zainal Abidin UniSZA, Fac Informat & Comp, Kuala Terengganu, Malaysia
[6] Melbourne Inst Technol, Sch IT & Telecommun Engn, Melbourne, Vic, Australia
[7] Natl Univ Mayor San Marcos, Sch Software Engn, Lima, Peru
[8] Univ Nacl Federico Villarreal, INERN, Lima, Peru
关键词
SCHEME;
D O I
10.1155/2021/5540296
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that revolves around smart devices' conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and control their behavior accordingly. As evident, these machines use sensors to collect vital information, which is then the complexity analyzed at a computational node that then smartly controls these devices' operational behaviors. Deep learning-based guessing attack protection algorithms have been enhancing IoT security; however, it still has a critical challenge for the complex industries' IoT networks. One of the crucial aspects of such systems is the need to have a significant training time for processing a large dataset from the network's previous flow of data. Traditional deep learning approaches include decision trees, logistic regression, and support vector machines. However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. It presents a deep analysis of AES, DES, 3DES, RSA, and Blowfish based on timing complexity, size, encryption, and decryption performances. It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. The assessment has been done using the simulation approach and it has been tested the speed of encryption and decryption of the selected encryption algorithms. For each encryption and decryption, the tests executed the same encryption using the same plaintext for five separate times, and the average time is compared. The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. For the experimental test, a set of plaintexts is used in the simulation-password-sized text and paragraph-sized text-that achieves target fair results compared to the existing algorithms in real-time deep learning networks for IoT applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [2] Lightweight and Secure Cryptographic Implementations for the Internet of Things
    Preneel, Bart
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV
  • [3] A New Lightweight Hybrid Cryptographic Algorithm for The Internet of Things
    Shemaili, Mouza Bani
    Yeun, Chan Yeob
    Mubarak, Khalid
    Zemerly, Mohamed Jamal
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 87 - 92
  • [4] Performance Comparison of Cryptographic Algorithms in Internet of Things
    Yilmaz, Berat
    Ozdemir, Suat
    [J]. 2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [5] A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things
    Zhou, Lu
    Su, Chunhua
    Yeh, Kuo-Hui
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (03)
  • [6] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [7] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    [J]. Wireless Networks, 2021, 27 : 1515 - 1555
  • [8] Lightweight and Attack-resilient PUF for Internet of Things
    Rajan, Akshayhari
    Sankaran, Sriram
    [J]. 2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 139 - 142
  • [9] HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
    Mohamed, Nur Nabila
    Yussoff, Yusnani Mohd
    Saleh, Mohammed Ahmed
    Hashim, Habibah
    [J]. JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA, 2020, 19 (03): : 279 - 319
  • [10] Cryptographic system for data applications, in the context of internet of things
    Panagiotou, P.
    Sklavos, N.
    Darra, E.
    Zaharakis, I. D.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2020, 72 (72)