Advertisement

Cryptography Applied to the Internet of Things

  • Javier Sanchez Guerrero
  • Robert Vaca Alban
  • Marco Guachimboza
  • Cristina Páez Quinde
  • Margarita Narváez Ríos
  • Luis Alfredo Jimenez Ruiz
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 715)

Abstract

Concepts and technologies that have made it possible for devices to interconnect to real-world objects, have existed for some time. The Internet of things can be defined as a pervasive and ubiquitous network that allows the monitoring and control of the physical environment by collecting, processing and analyzing data generated by sensors or smart objects. As the number of devices connect to the Internet increases, it is necessary to provide a safe and reliable operation of such devices. This paper emphasizes the use of cryptographic algorithms that can be implemented in devices that can connect to the internet of things, in order to provide security for the transmission of information on the vast network of sensors, a network that is increasing in size and number. This paper describes the problem of security on networked devices and describes the main algorithms and processes that provide security to this technology. It is concluded that since the devices that form the Internet of things have little memory and processing, it is necessary to apply algorithms that use the least amount of bits, with encryption algorithms that are based on elliptic curves. The advancement of technologies and algorithms that provide security should be considered, because every day we are more dependent on the internet of things.

Keywords

Internet Security Encryption 

References

  1. 1.
    Allen, N.: Weaknesses cybersecurity to make smart cities threaten more costly and dangerous than analog their prdecessors. USAPPGoogle Scholar
  2. 2.
    Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
  3. 3.
    Breezely George, M., Igni Sabasti Prabu, S.: Secured key sharing in cloud storage using elliptic curve cryptography. In: Proceedings of the International Conference on Soft Computing Systems (2015)Google Scholar
  4. 4.
    Chaitanya, B., Sekhar, C., Ramesh, N.: IR IOT based smart device using CC3200. Sci. TechnolGoogle Scholar
  5. 5.
    Chen, S., Maode, M., Zhenxing, L.: With an authentication scheme for identity-based cryptography M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)CrossRefGoogle Scholar
  6. 6.
    CISCO.: Securing the Internet of Things: A Proposed Framework, http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
  7. 7.
    Delfs, C., Galbraith, S.: Computing isogenies supersingular between elliptic curves over Fp. Des. Codes Cryptogr. 78(2), 425–440 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Galbraith, S., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1), 51–72 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Geetha, D., Sakthivel, D.: Orient stream cipher based service key management scheme for secure data access control using elliptic curve cryptography in wireless broadcast networks. Am.-Eurasian J. Sci. Res. 11(1), 63–71 (2016)Google Scholar
  10. 10.
    Hoffman, L.: Q & A: finding new directions in cryptography. Commun. ACM 59(6), 112–ff (2016)Google Scholar
  11. 11.
    Imagination Technologies: Internet of Things-device Opportunities for differentiation. Desing & ReuseGoogle Scholar
  12. 12.
    Kamboj, D., Gupta, D., Kumar, A.: Efficient scalar multiplication elliptic curve over. Int. J. Comput. Netw. Inf. Secur. 8(4), 56–61 (2016)Google Scholar
  13. 13.
    Kanase, P., Gaikwad, S.: Smart hospitals using Internet of Things. Int. Res. J. Eng. Technol. 3(3), 1735–1737 (2016)Google Scholar
  14. 14.
    Khan, M., Deen, S., Jabbar, S., Gohar, M., Ghayvat, H., Mukhopadhyay, S.: Context-aware intelligent low power SmarHome based on the Internet of Things. Comput. Electr. Eng. 52, 208–222 (2016)CrossRefGoogle Scholar
  15. 15.
    Kopetz, H.: Internet of Things. In: Real-Time Systems, pp. 307–323. Springer (2011)Google Scholar
  16. 16.
    Kumar Das, S., Sharma, G., Kumar Kevät, P.: Integrity and authentication using elliptic curve cryptography. J. Interdisc. Res. Imperial (2016)Google Scholar
  17. 17.
    Lechelt, Z., Rogers, Y., Marquardt, N., Shum, V.: Connectus: a new toolkit for teaching about the Internet of Things. In: Proceedings of the CHI 2016 Conference on Human Factors Extended Abstracts in Computing Systems, p. 4. ACM, New York (2016)Google Scholar
  18. 18.
    Maitin-Shepard, J., Tibouchi, M., Aranha, D.: Elliptic curve multiset hash. Cryptogr. Secur. (2016)Google Scholar
  19. 19.
    Malina, L., Hajny, J., Hosek, J.: On perspective of security and privacy-preserving solutions in the Internet of Things. Comput. Netw. 102, 83–95 (2016)CrossRefGoogle Scholar
  20. 20.
    Nazim, M., Ali Shah, M., Kamran Abbasi, M.: Analysis of embedded web resources in web of things. In: Proceedings of the International Conference on Communication IOARP and Networks. IOARP, London (2015)Google Scholar
  21. 21.
    Noor-ul-Ain, W., Atta-ur-Rahman, M., Nadeem, M., Abbasi Ghafoor, A.: Quantum cryptography trends: a milestone in information security. In: Advances in Intelligent Systems and Computing, pp. 25–39. Springer, Cham (2016)Google Scholar
  22. 22.
    Powell, A.: Hacking in the Public Interest: Authority, Legtimacy, Means, and Ends. New Media & Society, New Haven (2016)Google Scholar
  23. 23.
    Rao, M., Rao, B.: Paper reduction and total inter-carrier interference detection in canceled multiuser CDMA-OFDM CFO corrected elliptic curve cryptography with. Int. J. Appl. Eng. Res. 11(8), 5880–5888 (2016)Google Scholar
  24. 24.
    Scott, M.: Pairings faster using an efficient elliptic curve with an endomorphism. LNCS, pp. 258–269 (2005)Google Scholar
  25. 25.
    Shafagh, H., Duquennoy, S., Hu, W.: Talos: encryupted query processing for the Internet of Things. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, New York (2015)Google Scholar
  26. 26.
    Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)CrossRefGoogle Scholar
  27. 27.
    Smart, N.: Elliptic curves. In: Cryptography Made Simple. University of Bristol, London (2016)Google Scholar
  28. 28.
    WIND: Security in the Internet of Things: Lessons from the Past for the Future Connected. WIND, USA (2013)Google Scholar
  29. 29.
    Zambonelli, F.: Towards a general software engineering methodology for the Internet of Things. Softw. Eng. (2016)Google Scholar
  30. 30.
    Palattella, M., Dohler, M., Grieco, A., Rizzo, G.: Internet of Things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun., 4 (2016). IEEEGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Dirección de Tecnología de la Información y Comunicación, Facultad de Ciencias Humanas y de la EducaciónUniversidad Técnica de AmbatoAmbato-EcuadorEcuador
  2. 2.Facultad de Contabilidad y AuditoríaUniversidad Técnica de AmbatoAmbato-EcuadorEcuador

Personalised recommendations