A Two-Tier Security Model for IoT Based Devices

Authors

  • Dr. Dilbag Singh  Professor, Department of CSE, CDLU, Sirsa, Haryana, India
  • Snehlata  M.Tech. Scholar, Department of CSE, CDLU, Sirsa, Haryana, India

Keywords:

IoT, data security, AES, MIE encryption algorithm.

Abstract

Internet of things (IoT) is recognized as foremost important areas of future technology and gaining enormous attention from a wide range of industries. Although IoT explosion offers a wide range of opportunities for manufacturers and consumers, it also poses major risks in terms of security being a widespread network. A security mechanism is needed to protect the devices from cyber attacks. This can only be achieved by including security mechanism in the early stages of IoT based device’s design to observe privacy and safe transmission of data over network. In existing system, standard protocols were used for data transmission and basic encryption techniques were being applied for ensuring the security of IoT based devices. But it failed in preventing against routing attacks and packet losses in transmission. To overcome these problems, a two tier security model has been proposed in present study. Therefore, this paper proposes a two tier security model for IoT based devices. In this approach the advanced encryption standard (AES) are used with multiplicative inverse encryption algorithm (MIE) to ensure the security of data. A comparative analysis between proposed model and existing model has been performed in the present study. The parameters packet size, transmission time and error rate has been determined in the comparison.

References

  1. Vithya Vijaylakshmi, “Enhancing the security of IoT Data using Multilevel Encryption (2017)”
  2. B.S Kumar and T.C.S.P Raju “Introduced the Intrusion Detection System- Their Types and Prevention (2013).
  3. Trivedi,”Cryptographic Approach for Securing IoT Device” (2018)
  4. Vinay Sagar and Kusuma S.M,”Home Automation using Internet of things” (2015)
  5. Cryptography- Wikipedia, en.wikipdedia.org/wiki/cryptograph.
  6. Mahalakshmi et.al,"Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm," (2019).
  7. Ge Wu and Willy, “Generalized public-key cryptography with tight security” (2019) Y. Yusfrizal and F. Agustin, "Key Management Using Combination of Diffie–Hellman Key Exchange with AES Encryption," 2018 6th International Conference on Cyber and IT Service Management (CITSM), Parapet, Indonesia, 2018, pp. 1-6.
  8. Marek R.Ogiela et al.”Cognitive solutions for security and cryptography” (2019)
  9. Xiangyu Chang and Z.Zhang, ”Cipher text-only attack on optical scanning cryptography” (2019)
  10. IroshaJayatilleka and Malka N. Halgamuge “Internet of Things in healthcare: Smart devices, sensors, and system related to diseases and health conditions” (2019).
  11. Z. Zhang et.al, "Summary of research on IT network and Industrial Control network Security assessment”, (2019).
  12. S. E. Tuiri, N. Sabil, C. A. Kerrache and G. Koziel, "An EEG Based Key Generation Cryptosystem using Diffie-Hellman And AES," 2018 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), Manama, Bahrain, 2018, pp. 1-6.
  13. Diego Mendez, IoannisPapapanagiotou, Baijian Yang “Internet of Things: Survey on Security and Privacy” (2017) IOT SECURITY.
  14. H. Bodur and R. Kara, "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission," (2017) 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, 2017, pp. 144-147.
  15. P. Deshpande, S. Santhanalakshmi, P. Lakshmi and A. Vishwa, "Experimental study of Diffie-Hellman key exchange algorithm on embedded devices," 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, 2017, pp. 2042-2047.
  16. I.S. Nisha and M. Farik, “RSA Public Key Cryptography Algorithm A Review,” Int. J. Sci. Technol. Res., vol. 06, no. 07, pp. 187–191, 2017.
  17. Salah H. Abbdal,” Issue of making sure the Integrity of Data,” 2014.
  18. Sudhansu Ranjan Lenkaet “RSA encryption and digital signature technique,” 2014.
  19. M. Preetha and M. Nithya, “A Study and Performance analysis of RSA algorithm,” Ijcsmc, vol. 2, no. 6, pp. 126–139, 2013.
  20. B. S. Kumar, T. C. S. P. Raju, M.Ratnakar, S. D. Baba, and N.Sudhakar, “Intrusion Detection System- Types and Prevention,” Int. J. Compute. Sci. Inf. Technol., vol. 4, no. 1, pp. 77–82, 2013.
  21. Nilotpal Chakraborty (2013) “intrusion detection system and intrusion prevention system: a comparative study” International Journal of Computing and Business Research (IJCBR) Volume 4 Issue 2 May 2013.

Downloads

Published

2021-02-28

Issue

Section

Research Articles

How to Cite

[1]
Dr. Dilbag Singh, Snehlata, " A Two-Tier Security Model for IoT Based Devices" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 1, pp.228-237, January-February-2021.