Abstract

In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor’s resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.

Highlights

  • We keep permuting the values of the S-box and we calculate the nonlinearity of the generated substitution boxes (S-boxes) at each iteration until we get the

  • Many factors and constraints on sensor nodes must be taken into consideration for the implementation of lightweight cryptography

  • We chose to implement the solution on the XM1000 sensor which consists of the MSP430 microcontroller and the CC2420 radio chip

Read more

Summary

Introduction

The data security is considered to be one of the most critical issues; it is an indispensable requirement especially for the operations and transactions that are based on data. As a matter of fact, data encryption is required before transmitting the data into the network. Developing new technologies for IoT without considering security will make the privacy of users’ data vulnerable. The integration of the IoT with the security protocols is a challenge. Security aspects in the Internet of Things are getting more and more attention. Sensor nodes are characterized with their limited capacities and implementing solutions based on the security protocols makes the subject challenging

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call