Open Access BASE2021

Improvement of the CurveCP Cryptography for Enhancing the Secure of Internet of Things

Abstract

With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System. It also includes the simulated experiments, solutions evaluation, conclusion, and future development. Keywords: Internet of Things (IoTs), Wireless Sensor Network (WSN), CurveCP, cryptographic box References [1] J. Bernstein, CurveCP: Usable Security for the Internet, University of Illinois at Chicago, January 22, 2017. [2] V. Tanh, N. Q. Tri, N. L. Giang, N. A. Tuan, Design of Comprehensive Security Solution on Internet of Things with Improved DTLS Protocol and Overhearing Mechanism, Fundamental and Applied Information Technology Research (FAIR), Nha Trang, Vietnam, 2020. [3] X. Li, W. He, S. Li, Internet of Things in Industries: A Survey,IEEE Transactions on Industrial Informatics, Vol. 10, No. 4, 2014, pp. 2233-2243. [4] Hankerson, A. J. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Publishing, 2003. [5] Pauly, C. Perkins, K. Rose, C. Wood, A Survey of Transport Security Protocols, University of Glasgow, September 6, 2018. [6] Dunkels, Contiki: Bringing IP to Sensor Networks, ERCIM News Journal, European Union, 2009. [7] Pedro, Mugdhe, Samarth, Cooja Simulator - Contiki Tutorials, Autonomous Networks Research Group, University of South California, 2016. [8] Abdellatif, Contiki Developer, Power Consumption, July 17, 2017. [9] Culler, D. Estrin, M. Srivastava, Guest Editors' Introduction: Overview of Sensor Networks, 2004, pp. 41-49, https://doi.org/10.1109/mc.2004.93. [10] C. Mansfield, J.L. Antonakos, Computer Networking from LANs to WANs: Hardware, Software, and Security, Boston Cengage Learning, 2010, pp. 501. [11] SAS Team, What is Network Latency (and How Do You Use a Latency Calculator to Calculate Throughput)?, The SAS Group of Companies Limited, April, 2019. [12] Johnson, M. Healy, P. V.D. Ven, J. H. Martin, J. Nelson, T. Newe, E. Lewis, A Comparative Review of Wireless Sensor Network Mote Technologies, IEEE SENSORS Conference, 2009, pp. 1439-1442. [13] D Hofstrand, Energy Measurements and Conversions, Iowa State University Extension and Outreach, 2007. [14]Mojzís, tinyssh, The SSH Library, 2018. [15] J. Bernstein, T. Lange, P. Schwabe, NaCl: Networking and Cryptography library, University of Illinois at Chicago, 2016. [16] Felker, Musl 1.1.24 Reference Manual, License of Massachusetts Institute of Technology, 2011. [17] V. Tanh, N. Q. Tri, N. G. Tuyen, T. Q. Duc, T. H. Anh, B. T. Tung, The Flooding Attack in Low Power and Lossy Networks: A Case Study, The 7 th IEEE International Conference on Smart Communications in Network Technologies (SaCoNet 2018), El Oued, Algeria, 2018. [18]N. V. Tanh, N. Q. Tri, G. Tuyen, N. L. Giang, N. V. Tien, Design a Security System for Internet of Things with Detectinng and Author Proceedings of Eliminating Denial of Service Attack Based on Overhearing Mechanism, the 3rd Symposium of Information Security (SoIS 2018), Da Nang, Vietnam, 2018. [19] S. Samonas, D. Coss, The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, Journal of Information System Security, Vol. 10, No. 3, 2014, pp. 21-45.

Sprachen

Englisch

Verlag

VNU Journal of Science

DOI

10.25073/2588-1086/vnucsce.282

Problem melden

Wenn Sie Probleme mit dem Zugriff auf einen gefundenen Titel haben, können Sie sich über dieses Formular gern an uns wenden. Schreiben Sie uns hierüber auch gern, wenn Ihnen Fehler in der Titelanzeige aufgefallen sind.