Secure IoT Seed-based Matrix Key Generator A Novel Algorithm for Steganographic Security application

被引:0
作者
Aine, Youssef Nour-El [1 ]
Leghris, Cherkaoui [1 ]
机构
[1] Hassan II Univ, Lab Math Comp Sci & Applicat Sci & Technol, Fac Mohammedia, Mohammadia, Morocco
关键词
Security; IoT; steganography; key exchange; cryptography;
D O I
10.14569/IJACSA.2024.01503108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid evolution of the Internet of Things (IoT) has significantly transformed various aspects of both personal and professional spheres, offering innovative solutions in fields from home automation to industrial manufacturing. This progression is driven by the integration of physical devices with digital networks, facilitating efficient communication and data processing. However, such advancements bring forth critical security challenges, especially regarding data privacy and network integrity. Conventional cryptographic methods often fall short in addressing the unique requirements of IoT environments, such as limited device computational power and the need for efficient energy consumption. This paper introduces a novel approach to IoT security, inspired by the principles of steganography - the art of concealing information within other non-secret data. This method enhances security by embedding secret information within the payload or communication protocols, aligning with the low-power and minimal processing capabilities of IoT devices. We propose a steganographic key generation algorithm, adapted from the Diffie- Hellman key exchange model, tailored for IoT. This approach eliminates the need for explicit parameter exchange, thereby reducing vulnerability to key interception and unauthorized access, prevalent in IoT networks. The algorithm utilizes a pre-shared 2D matrix and a synchronized seed- based approach for covert communication without explicit data exchange. Furthermore, we have rigorously tested our algorithm using the NIST Statistical Test Suite (STS), comparing its execution time with other algorithms. The results underscore our algorithm's superior performance and suitability for IoT applications, highlighting its potential to secure IoT networks effectively without compromising on efficiency and device resource constraints. This paper presents the design, implementation, and potential implications of this algorithm for enhancing IoT security, ensuring the full realization of IoT benefits without compromising user security and privacy.
引用
收藏
页码:1077 / 1086
页数:10
相关论文
共 24 条
[1]  
Alhajjar E., 2022, EUR C CYB WARF SEC, DOI [10.34190/eccws.21.1.197, DOI 10.34190/ECCWS.21.1.197]
[2]   An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks [J].
Ali, Shahwar ;
Humaria, A. ;
Ramzan, M. Sher ;
Khan, Imran ;
Saqlain, Syed M. ;
Ghani, Anwar ;
Zakia, J. ;
Alzahrani, Bander A. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06)
[3]  
Almohammedi A.A., 2023, Lecture Notes in Computer Science, V14202
[4]  
Aoun O, 2018, INT J ADV COMPUT SC, V9, P331
[5]  
Balfaqih M., 2023, 2023 1 INT C ADV INN, P1, DOI [10.1109/ICAISC56366.2023.10255090, DOI 10.1109/ICAISC56366.2023.10255090]
[6]   A Blockchain-Enabled IoT Logistics System for Efficient Tracking and Management of High-Price Shipments: A Resilient, Scalable and Sustainable Approach to Smart Cities [J].
Balfaqih, Mohammed ;
Balfagih, Zain ;
Lytras, Miltiadis D. ;
Alfawaz, Khaled Mofawiz ;
Alshdadi, Abdulrahman A. ;
Alsolami, Eesa .
SUSTAINABILITY, 2023, 15 (18)
[7]   Lightweight Cryptography: A Solution to Secure IoT [J].
Dhanda, Sumit Singh ;
Singh, Brahmjit ;
Jindal, Poonam .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) :1947-1980
[8]  
Hegde S., 2022, 2022 IEEE 3 GLOB C A, P1, DOI [10.1109/GCAT55367.2022.9971870, DOI 10.1109/GCAT55367.2022.9971870]
[10]   Industry 4.0: Industrial Internet of Things (IIOT) [J].
Munirathinam, Sathyan .
DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 :129-164