体育赛事投注记录

advertisement

Controlled Privacy-Aware (CPA) Protocol for Machine-to-Machine Communication in Internet of Things

  • Poonam Ninad RailkarEmail author
  • Parikshit Narendra Mahalle
  • Gitanjali Rahul Shinde
Conference paper
  • 34 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1162)

Abstract

internet of things (iot) is buzzword nowadays, and rapid growth of iot in the market makes the impact in private and public domains. it is a giant network of devices, people, and services. the devices and things are integrated with a variety of sensors generate heterogeneous data, and these devices are connected to the iot platform. this data is a very important asset of many organizations. there are a variety of applications that carry sensitive data. the security of such applications becomes a challenging responsibility for security researchers due to the resource constraint environment of iot. there are various aspects of security, but confidentiality of data is one the major aspect that needs to be addressed. in iot communication, the data traveling from one to another node, there are chances of a replay attack, man-in-middle attack, eavesdropping, etc. to overcome these attacks and challenges, there is a need for efficient lightweight algorithms that maintain confidentiality and privacy of data. at the same time, algorithms must efficiently work in a resource constraint environment. this paper presents controlled privacy-aware (cpa) protocol using elliptic curve cryptography diffie–hellman algorithm to exchange key, as well as for encryption and decryption of data to maintain the privacy. this paper presents formal security analysis against the above-mentioned attacks and gives a comparison of performance in terms of computational time with state of art.

Keywords

Elliptic curve cryptography Internet of things Diffie–Hellman Privacy aware Security Confidentiality Machine-to-machine communication 

References

  1. 1.
    Rouse, M.: Internet of things (IoT). IOT Agenda. Retrieved 14 Aug 2019 (2019)
  2. 2.
    Barki, A., et al.: M2M security: challenges and solutions. IEEE Commun. Surv. Tutor. 18(2), 1241–1254 (2016)
  3. 3.
  4. 4.
    Railkar, P.N., Mahalle, P.N., Shinde, G.R.: Access control schemes for machine to machine communication in IoT: comparative analysis and discussion. In: 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), IEEE, pp. 59–63 (2018)
  5. 5.
    Song, T., et al.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 4(6), 1844–1852 (2017)
  6. 6.
    Boussada, R., Hamdane, B., Elhdhili, M.E., Saidane, L.A.: PP-NDNoT: on preserving privacy in IoT-based E-health systems over NDN. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp. 1–6 (2019)
  7. 7.
    Gheisariy, M., Wang, G., Khanz, W.Z., Fernández-Campusano, C.: A context-aware privacy-preserving method for IoT-based smart city using software defined networking. Comput. Secur. (2019)
  8. 8.
    Mohanty, S.N., Ramya, K.C., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K., Khanna, A.: An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Futur. Gener. Comput. Syst. 102, 1027–1037 (2020)
  9. 9.
    Pasupuleti, S.K., Varma, D.: Lightweight ciphertext-policy attribute-based encryption scheme for data privacy and security in cloud-assisted IoT. In: Real-Time Data Analytics for Large Scale Sensor Data, pp. 97–114. Academic Press, Cambridge (2020)
  10. 10.
    Cha, S.-C., et al.: Privacy-aware and blockchain connected gateways for users to access legacy IoT devices. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), IEEE (2017)
  11. 11.
    Radhakishan, V., Selvakumar, S.: Prevention of man-in-the-middle attacks using ID based signatures. In: 2011 Second International Conference on Networking and Distributed Computing (ICNDC), IEEE (2011)
  12. 12.
    Han, J., Susilo, W., Yi, M.: Identity-based data storage in cloud computing. Futur. Gener. Comput. Syst. 29(3), 673–681 (2013)
  13. 13.
    Boneh, D., Matt F.: Identity-based encryption from the weil pairing. Annual International Cryptology Conference. Springer, Heidelberg (2001)
  14. 14.
    Huang X., Shah, P.G., Sharma, D.: Protecting from attacking the Man-in-Middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 Fourth International Conference on Network and System Security. IEEE (2010)
  15. 15.
    Vasundhara, K.L., et al.: A comparative study of RSA and ECC. Int. J. Eng. Res. Appl. 8(1), 49–52 (2018). . ISSN: 2248-9622
  16. 16.
    Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017). ISSN: 0973-4562
  17. 17.
    Pharkkavi, D., Maruthanayagam. D.: Time complexity analysis of RSA and ECC based security algorithms in cloud data. Int. J. Adv. Res. Comput. Sci. 9(3) (2018)
  18. 18.
    Shaikh, P., Kaul, V.: Enhanced security algorithm using hybrid encryption and ECC. IOSR J. Comput. Eng. (IOSR-JCE) 16(3), 80–85 (2014)
  19. 19.
    Naik, S.C., Mahalle, P.N.: Rubik’s cube based private key management in wireless networks. In: 2013 15th International Conference on Advanced Computing Technologies (ICACT), IEEE (2013)
  20. 20.
    Mahalle, P., et al.: Identity establishment and capability based access control (IECAC) scheme for internet of things.In: WPMC (2012)
  21. 21.
    Mahalle, P.N., et al.: Identity driven capability based access control (ICAC) scheme for the internet of things. In: 2012 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE (2012)
  22. 22.
    Li, J., et al.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425–437 (2015)

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Poonam Ninad Railkar
    • 1
    Email author
  • Parikshit Narendra Mahalle
    • 1
  • Gitanjali Rahul Shinde
    • 1
  1. 1.Computer Engineering Department, Smt. Kashibai Navale College of Engineering, Savitribai Phule Pune UniversityPuneIndia

Personalised recommendations