SHA-AES based on Chaining Block Code and Galois Counter Mode Encryptions for the Privacy of Smart Farming Systems

A. A. Alfa, T. O. Aro, Olukiran Oyenike Adunni, Danjuma Zakwoi Iliya, O. Awe, Ayodeji Owonipa
{"title":"SHA-AES based on Chaining Block Code and Galois Counter Mode Encryptions for the Privacy of Smart Farming Systems","authors":"A. A. Alfa, T. O. Aro, Olukiran Oyenike Adunni, Danjuma Zakwoi Iliya, O. Awe, Ayodeji Owonipa","doi":"10.1109/SEB-SDG57117.2023.10124512","DOIUrl":null,"url":null,"abstract":"In smart farming, IoT plays a dominant role in diverse data generation, data transmission, and applications such as irrigation estimation, soil and environmental monitoring, food supply chain and field monitoring. The current architecture of IoT is mainly centralized and single-point controlled; thereby opening up privacy and security lapses. Several approaches have favoured advanced data encryption to preserve privacy during transmission or storage. The debilitating challenges of IoT systems sparingly reported in previous works include: security of physical/logical components; software/hardware interoperability; high energy requirements; low processing/storage capacity, and network architecture/scalability. This paper comparatively studied encryption modes of Chaining Block Code (CBC) and Galois Counter Mode (GCM) based on hybrid algorithm of SHA1-256 and AES246 (known as SHA-AES scheme) towards preserving privacy of IoT data. The outcomes revealed that, the SHA-AES scheme based on CBC was better in terms of speed - encryption (8.34%) and decryption (43.42%); storage consumption - secret key sizes (50.00%) and ciphertext sizes (26.88%) against GCM. This implies that, the GCM approach offers the highest privacy protection but, less effective due to sluggish speed and high memory utilization. Also, strong cryptographic schemes interleaved with CBC and GCM hardening schemes offered improved confusion state, diffusion state, complexity, and performances. Future works could consider modifying the complex processes of GCM approach by minimizing key generation time to support resource-constrained devices.","PeriodicalId":185729,"journal":{"name":"2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEB-SDG57117.2023.10124512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In smart farming, IoT plays a dominant role in diverse data generation, data transmission, and applications such as irrigation estimation, soil and environmental monitoring, food supply chain and field monitoring. The current architecture of IoT is mainly centralized and single-point controlled; thereby opening up privacy and security lapses. Several approaches have favoured advanced data encryption to preserve privacy during transmission or storage. The debilitating challenges of IoT systems sparingly reported in previous works include: security of physical/logical components; software/hardware interoperability; high energy requirements; low processing/storage capacity, and network architecture/scalability. This paper comparatively studied encryption modes of Chaining Block Code (CBC) and Galois Counter Mode (GCM) based on hybrid algorithm of SHA1-256 and AES246 (known as SHA-AES scheme) towards preserving privacy of IoT data. The outcomes revealed that, the SHA-AES scheme based on CBC was better in terms of speed - encryption (8.34%) and decryption (43.42%); storage consumption - secret key sizes (50.00%) and ciphertext sizes (26.88%) against GCM. This implies that, the GCM approach offers the highest privacy protection but, less effective due to sluggish speed and high memory utilization. Also, strong cryptographic schemes interleaved with CBC and GCM hardening schemes offered improved confusion state, diffusion state, complexity, and performances. Future works could consider modifying the complex processes of GCM approach by minimizing key generation time to support resource-constrained devices.
基于链块码和伽罗瓦计数器模式加密的SHA-AES智能农业系统隐私保护
在智慧农业中,物联网在灌溉估算、土壤和环境监测、食品供应链和现场监测等多种数据生成、数据传输和应用中发挥主导作用。目前物联网的架构主要是集中式和单点控制;从而暴露了隐私和安全漏洞。有几种方法支持高级数据加密,以保护传输或存储过程中的隐私。在以前的工作中很少报道物联网系统的衰弱挑战包括:物理/逻辑组件的安全性;软件/硬件互操作性;能量需求高;低处理/存储容量,和网络架构/可扩展性。本文比较研究了基于SHA1-256和AES246混合算法(即SHA-AES方案)的链块码(CBC)和伽罗瓦计数器模式(GCM)两种保护物联网数据隐私的加密模式。结果表明:基于CBC的SHA-AES方案在加密速度(8.34%)和解密速度(43.42%)方面均优于CBC方案;存储消耗——密钥大小(50.00%)和密文大小(26.88%)相对于GCM。这意味着,GCM方法提供了最高的隐私保护,但由于速度缓慢和内存利用率高,效率较低。此外,与CBC和GCM强化方案交织的强加密方案提供了更好的混淆状态、扩散状态、复杂性和性能。未来的工作可以考虑通过最小化密钥生成时间来修改GCM方法的复杂过程,以支持资源受限的设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信