Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT

被引:2
|
作者
Nesa, Nashreen [1 ]
Banerjee, Indrajit [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Dept Informat Technol, Howrah 711103, W Bengal, India
关键词
Chaos theory; Merkle Hash Tree; IoT; Security; Encryption; AUTHENTICATION SCHEME; INTERNET; THINGS;
D O I
10.1007/978-3-662-61092-3_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide applicability of sensors in our daily lives, security has become one of the primary concerns in an Internet of Things (IoT) environment. Particularly, user's privacy and unauthorized access to sensitive information needs to be kept in mind while designing security algorithms. This paper puts forward a security protocol that integrates authentication of the deployed IoT devices and encryption of the generated data. We have modified the well-known Merkle Hash Tree to adapt to an IoT environment for authenticating the devices and utilized the concepts of Chaos theory for developing the encryption algorithm. The use of chaos in cryptography are known to satisfy the basic requirements of the cryptosystem such as, high sensitivity, high computational speed and high security. In addition, we have proposed a chaotic map named Quadratic Sinusoidal Map which exhibits better array of chaotic regime when compared to the traditional quadratic map. The security analysis demonstrate that the proposed protocol is simple having low computational requirements, has strong security capabilities and highly resilient to security attacks.
引用
收藏
页码:85 / 105
页数:21
相关论文
共 50 条
  • [1] Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 253
  • [2] Radial kernelized regressive merkle-damgard cryptographic hash blockchain for secure data transmission with IoT sensor node
    Yuvaraj, N.
    Mohanraj, P.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 1998 - 2010
  • [3] Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node
    Yuvaraj N
    Mohanraj P
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1998 - 2010
  • [4] An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
    Kaveh, Masoud
    Falahati, Abolfazl
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (07) : 1010 - 1019
  • [5] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree
    Zou, Jing
    Sun, Yunchuan
    Li, Shixian
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
  • [6] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [7] Secure data sharing using Merkle hash digest based blockchain identity management
    Rathee, Tripti
    Singh, Parvinder
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (06) : 3851 - 3864
  • [8] Secure data sharing using Merkle hash digest based blockchain identity management
    Tripti Rathee
    Parvinder Singh
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3851 - 3864
  • [9] An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications
    Al-Odat, Zeyad A.
    Al-Qtiemat, Eman M.
    Khan, Samee U.
    [J]. 2020 IEEE CLOUD SUMMIT, 2020, : 66 - 71
  • [10] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021