Abstract

In this paper, we studied lightweight cryptography for IoT based Bicycle Sharing System. We maintained a remotely located real time server and four separate stations with kiosk control box system, designed with Internet based IoT devices. Then, we calculated the processing time to unlock the bicycle from each station, once the request was sent to the server. The calculated load and processing time were compared after the application of cryptography algorithm. The comparison helped us conclude that the LEA cryptography showed minimal time difference when applied in a real time system. At the same time, highly secure data transmission was also achieved.

Highlights

  • IoT (Internet of Things) has been recognized as the area with high number of research and future possibilities

  • Cryptography is a viable option when it comes to the security of an IoT based system

  • We built an IoT based bicycle sharing system and studied the time consumed while sending a request to the server from these stations, before and after the application of LEA (Lightweight Encryption Algorithm) cryptography algorithm

Read more

Summary

Introduction

IoT (Internet of Things) has been recognized as the area with high number of research and future possibilities. With the introduction of IoT in larger scale, many security issues have been recorded. These existing IoT systems must maintain strong security, minimized control of humans, and strong resistance to the environment [2]. There is an increasing number of attacks targeted at Internet of Things every year [3]. As bicycle sharing system is a widely used commercial transportation system [5], testing an encryption algorithm in such system is more practical. We built an IoT based bicycle sharing system and studied the time consumed while sending a request to the server from these stations, before and after the application of LEA (Lightweight Encryption Algorithm) cryptography algorithm. LEA was preferred over other algorithms because of its high speed and high security against attacks on block ciphers

System and Performance Comparison
Source Code
System Performance
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call