End-to-End Encryption in Resource-Constrained IoT Device

被引:5
|
作者
Alluhaidan, Ala Saleh D. [1 ]
Prabu, P. [2 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11564, Saudi Arabia
[2] CHRIST, Dept Comp Sci, Bengaluru 560029, India
关键词
Cryptography; the IoT; lightweight cryptography; security;
D O I
10.1109/ACCESS.2023.3292829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities. Ensuring the security, communication, and privacy protection of end-users is a major concern in IoT development. Secure communication is a significant requirement for various applications, especially when communication devices have limited resources. The emergence of IoT also necessitates the use of low-power devices that interconnect with each other for essential processing. These devices are expected to handle large amounts of monitoring and control data while having limited capabilities and resources. The algorithm used for secure encryption should protect vulnerable devices. Conventional encryption methods such as RSA or AES are computationally expensive and require large amounts of memory, which can adversely affect device performance. Simplistic encryption techniques are easily compromised. To address these challenges, an effective and secure lightweight cryptographic process is proposed for computer devices. This process utilizes a symmetrical encryption key block, incorporating a custom proxy network (SP) and a modified Feistel architecture. Security analysis and performance evaluation results demonstrate that the proposed protocol is secure and energy-efficient. The symmetric key encryption scheme is based on sequences in the Feistel cipher, with multiple rounds and sub-keys generated using principles derived from genetic algorithms. This proposed algorithm minimizes processing cycles while providing sufficient security.
引用
收藏
页码:70040 / 70051
页数:12
相关论文
共 50 条
  • [1] Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT
    Iqbal, Muhammad A.
    Bayoumi, Magdy
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 523 - 530
  • [2] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
    Ullah, Shafi
    Nasir, Haidawati Muhammad
    Kadir, Kushsairy
    Khan, Akbar
    Memon, Ahsanullah
    Azhar, Shanila
    Khan, Ilyas
    Ashraf, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249
  • [3] A Model-Specific End-to-End Design Methodology for Resource-Constrained TinyML Hardware
    Dong, Yanchi
    Jia, Tianyu
    Du, Kaixuan
    Jing, Yiqi
    Wang, Qijun
    Zhan, Pixian
    Zhang, Yadong
    Yan, Fengyun
    Ma, Yufei
    Liang, Yun
    Ye, Le
    Huang, Ru
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [4] Resource-Constrained Specific Emitter Identification Using End-to-End Sparse Feature Selection
    Tao, Mengyuan
    Fu, Xue
    Lin, Yun
    Wang, Yu
    Yao, Zhisheng
    Shi, Shengnan
    Gui, Guan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6067 - 6072
  • [5] Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
    Shafi Ullah
    Raja Zahilah
    Cybersecurity, 4
  • [6] Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
    Ullah, Shafi
    Zahilah, Raja
    CYBERSECURITY, 2021, 4 (01)
  • [7] IoT ETEI: End-to-end IoT device identification method
    Yin, Feihong
    Yang, Li
    Wang, Yuchen
    Dai, Jiahao
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [8] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)
  • [9] Using End-to-end Data Encryption to Secure SIP Device Configuration
    Chen, Xudong
    Fan, Wenjun
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63
  • [10] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
    Kumar, Sam
    Hu, Yuncong
    Andersen, Michael P.
    Popa, Raluca Ada
    Culler, David E.
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536