Open Access
Subscription Access
A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities
The proliferation of sensor networks and other Internet of Things devices has prompted growing privacy and safety concerns. These devices have very little memory, computing power, and storage space. Security for low-powered IoT devices, such as RFID tags, nodes in wireless sensor networks (WSNs), etc., has become increasingly difficult. So, enough security for these devices was achieved by the development of lightweight cryptographic algorithms. In recent years, "smart cities" have emerged to improve contemporary lifestyles and further social development. These are enabled by developments in ICT and may open up new avenues for social and economic development. However, not everything is as secure and private as we hope it will be. The effects of the Internet of Things on IoT-based data transmission networks have been the subject of extensive study over the past few decades. Due to this flaw in the authentication process, verifying the identification of such people safely is extremely difficult. The study's goal is to provide a safe authentication technique for IoT that makes use of Hybrid and Adaptive Cryptography (HAC). In this study, we focus on authentication as a potential security risk in IoT data transmission networks. The study proposes a hybrid and adaptive cryptography (HAC) approach to authentication for the Internet of Things as a means of resolving this issue. The proposed technique of cryptographic protection makes use of the exclusive-or (Ex-or) operation, a hashing function, and a hybrid encryption strategy based on the Rivest Shamir Adleman (RSA) and the Advanced Encryption Standard (AES) algorithms. The proposed solution is simple to implement while effectively overcoming the cryptographic system's constraints via a hybrid encryption mechanism. Using the Diffie-Hellman key exchange protocol, the RSA algorithm for privacy, and the SHA-1 algorithm for authenticity, this study aims to provide a unified security architecture for modern networks.
Keywords
Smart City, Authentication, IoT, RSA, AES, Cryptography, SHA, HAC, WSN, GPS, RFID.
User
Font Size
Information
- Kundu, A., Das, J. C., De, D., & Debnath, B. (2022). Reversible Vigenere Cryptographic Cipher in Quantum-Dot Cellular Automata. In 2022 IEEE International Conference of Electron Devices Society Kolkata Chapter (EDKCON).
- Dorobantu, O. G., Apostol, A. G., & Datcu, O. (2022). The poly-alphabetic substitution ciphers - a viable solution for IoT applications? In 2022 International Symposium on Electronics and Telecommunications (ISETC).
- Jassim, S. A., & Farhan, A. K. (2021). A Survey on Stream Ciphers for Constrained Environments. In 2021 1st Babylon International Conference on Information Technology and Science (BICITS).
- Iqbal, M., Velasco, L., Costa, N., Napoli, A., Pedro, J., & Ruiz, M. (2022). LPsec: a fast and secure cryptographic system for optical connections. Journal of Optical Communications and Networking, 14(4).
- Vignesh, R. S., Chinnammal, V., Gururaj.D, Kishore Kumar, A. T. A., & Karthikeyan, K. V. (2023). Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI).
- Windarta, S., Suryadi, S., Ramli, K., Lestari, A. A., Wildan, W., Pranggono, B., & Wardhani, R. W. (2023). Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things. IEEE Access, 11.
- Hariss, K., & Noura, H. (2022). ACiS: Lightweight and Robust Homomorphic Block Cipher Additive Scheme. In 2022 International Wireless Communications and Mobile Computing (IWCMC).
- Datta, B. P. R. V., & Sreehari, K. N. (2023). FPGA Implementation of Different Layers of Present Cipher. In 2023 3rd International Conference on Intelligent Technologies (CONIT).
- Baksi, A., Kumar, S., & Sarkar, S. (2022). A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions. IEEE Transactions on Computers, 71(10).
- Liu, Y., He, J., Ma, H., Qu, T., & Dai, Z. (2022). A Comprehensive Evaluation of Integrated Circuits Side-Channel Resilience Utilizing Three-Independent-Gate Silicon Nanowire Field Effect TransistorsBased Current Mode Logic. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(10).
- Hussain, S., & Mohideen, P. M. S. (2023). Advanced Machine Learning Approach for Suspicious Coded Message Detection using Enigma Cipher. In 2023 Second International Conference on Electronics and Renewable Systems (ICEARS).
- Irodah, R. M., & Adriansyah, A. (2022). Analysis and Design of Self-service Local Water Company (LWC) using Vernam Cipher Cryptography Algorithm. In 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS).
- Velasco, L., Iqbal, M., & Ruiz, M. (2023). Secure Optical Communications Based on Fast Cryptography. In 2023 23rd International Conference on Transparent Optical Networks (ICTON).
- Parida, D., & Bhanja, U. (2023). Smart Meters: Cyber Security Issues and Their Solutions. In 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN).
- Upadhyaya, D., Gay, M., & Polian, I. (2023). LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits. In 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
- Iqbal, M., Ari Laksmono, A. M., Prihatno, A. T., Pratama, D., Jeong, B., & Kim, H. (2023). Enhancing IoT Security: Integrating MQTT with ARIA Cipher 256 Algorithm Cryptography and mbedTLS. In 2023 International Conference on Platform Technology and Service (PlatCon).
- Garcia, D., & Liu, H. (2021). A Study of Post Quantum Cipher Suites for Key Exchange. In 2021 IEEE International Symposium on Technologies for Homeland Security (HST).
- Salman, R. S., Farhan, A. K., & Shakir, A. (2022). Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey. In 2022 International Conference on Computer Science and Software Engineering (CSASE).
- Segala, A. (2022). Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser. Packt Publishing.
- Rajashree, S., Vineetha, B., Mehta, A. B., & Honnavalli, P. B. (2022). Homomorphic Encryption Approach for String Concatenation. In 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA).
- Unger, W., Babinkostova, L., Borowczak, M., & Erbes, R. (2021). Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers. In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
- Jassim, S. A., Farhan, A. K., & Radie, A. H. (2021). Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things. In 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA).
- Dar, M. A., Askar, A., & Bhat, S. A. (2022). Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities. In 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
- Biesmans, J., Regazzoni, F., & Mentens, N. (2023). Application-specific FPGAs: cryptographic agility through customized reconfigurable architectures. In 2023 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
- Umamaheswari, S., Vishal, N. R., Pragadesh, N. R., & Lavanya, S. (2023). Secure Data Transmission using Hybrid Crypto Processor based on AES and HMAC Algorithms. In 2023 2nd International Conference on Advancements in Electrical, Electronics, Communication and Automation (ICAECA).
Abstract Views: 186
PDF Views: 1