Skip to main content

Evaluation of the Recommended Algorithms in the Internet of Things

  • Chapter
  • First Online:
Artificial Intelligence of Things for Smart Green Energy Management

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 446))

  • 283 Accesses

Abstract

In the recent revolution of exchanging information, more and more objects (things) become in need of a media that allows them to talk to each other. Perhaps, the Internet is, so far, the most suitable infrastructure to establish a connection between billions of things. Internet of Things (IoT) phrase was introduced to express this fact. The internet security challenges have always been the concern of scientists. However, IoT imposes new demands since the connected things (Devices) usually have limited capabilities. Therefore, different types of security solutions are needed to tackle such demands. Our work is with the authentication security phase, which has issues associated with the IoT structure nature. One of the major issues in this field is the authentication issue. In this paper, we discussed the authentication issues associated with IoT, and then a proposed authentication solution is provided. Our concern is to construct an abstract end-user authentication approach that considers IoT requirements. According to our results, security solutions for IoT have to utilize algorithms, which have good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Marsan, C.: The Internet of Things: An Overview. Internet Society, Tech. Rep. (2015)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security, 4th edn. Prentice-Hall Inc., Upper Saddle River, NJ, USA (2005)

    Google Scholar 

  3. Malina, L., Hajny, J., Fujdiak, R., Hosek, J.: On perspective of security and privacy-preserving solutions in the internet of things. Comput. Netw. 102, 83–95 (2016)

    Article  Google Scholar 

  4. Zhao, G., Si, X., Wang, J., Long, X., Hu, T.: A novel mutual authentication scheme for internet of things. In: Proceedings of 2011 International Conference on Modelling, Identification and Control, pp. 563–566 (2011)

    Google Scholar 

  5. Ahamed, S.I., Rahman, F., Hoque, E.: Erap: Ecc based Rfid authentication protocol. In: 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp. 219–225 (2008)

    Google Scholar 

  6. Olsen, R.L., Fitzek, F., Prasad, R., Saarnio, J.: My Personal Adaptive Global Net-Magnet, WWRF8bis. Beijing, China, pp. 26–27 (2004)

    Google Scholar 

  7. Kyriazanos, D.M., Stassinopoulos, G.I., Prasad, N.R.: Ubiquitous access control and policy management in personal networks. In: Third annual international conference on mobile and ubiquitous systems: networking services, pp. 1–6 (2006)

    Google Scholar 

  8. Braun, M., Hess, E., Meyer, B.: Using elliptic curves on Rfid tags. Int. J. Comput. Sci. Netw. Secur. 8 (2008)

    Google Scholar 

  9. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS. Citeseer (2002)

    Google Scholar 

  10. Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, pp. 58–67 (2005)

    Google Scholar 

  11. Verma, R.R.S., O’Mahony, D., Tewari, H.: Progressive authentication in ad hoc networks. In: Proceedings of the Fifth European Wireless Conference (2004)

    Google Scholar 

  12. Venkatraman, L., Agrawal, D.P.: A novel authentication scheme for ad hoc networks. In: 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), vol. 3, pp. 1268–1273 (2000)

    Google Scholar 

  13. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in the internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  14. Sklavos, N., Zaharakis, I.D.: Cryptography and security in the internet of things (IoT): models, schemes, and implementations. In: New Technologies, Mobility and Security (NTMS), 2016 8th IFIP International Conference on. IEEE, pp. 1–2 (2016)

    Google Scholar 

  15. Katagi, M., Moriai, S.: Lightweight Cryptography for the Internet of Things. Sony Corporation, pp. 7–10 (2008)

    Google Scholar 

  16. Usman, M., Ahmed, I., Aslam, M.I., Khan, S., Shah, U.A.: Sit: A Lightweight Encryption Algorithm for Secure Internet of Things (2017). arXiv preprint arXiv:1704.08688

  17. Nandhini, P., Vanitha, V.: A study of lightweight cryptographic algorithms for IoT. 6, 26–35 (2017)

    Google Scholar 

  18. Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley (2007)

    Google Scholar 

  19. Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained node networks. Tech. Rep. (2014)

    Google Scholar 

  20. Luhach A.K., et al.: Analysis of lightweight cryptographic solutions for the internet of things. Indian J. Sci. Technol. 9(28) (2016)

    Google Scholar 

  21. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, Weeks, S., B., and Wingers, L.: The Simon and Speck families of lightweight block ciphers, cryptology e-print archive. Indian J. Sci. Technol. (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emad R. Gadalla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gadalla, E.R., Sallabi, O.M., Kasih, T.M., Emhemed, A.A.A. (2022). Evaluation of the Recommended Algorithms in the Internet of Things. In: El Himer, S., Ouaissa, M., Emhemed, A.A.A., Ouaissa, M., Boulouard, Z. (eds) Artificial Intelligence of Things for Smart Green Energy Management. Studies in Systems, Decision and Control, vol 446. Springer, Cham. https://doi.org/10.1007/978-3-031-04851-7_9

Download citation

Publish with us

Policies and ethics