Improving the IoT and Cloud Computing integration using Hybrid Encryption

Nadeem Chahin, A. Mansour
{"title":"Improving the IoT and Cloud Computing integration using Hybrid Encryption","authors":"Nadeem Chahin, A. Mansour","doi":"10.37394/232022.2023.3.1","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Network (WSN) is an essential technology in many Internet of Things (IoT) applications, and since sensor nodes suffer from limited resources, it has become possible to overcome storage capacity problems using cloud computing, the integration of Internet of Things (IoT) with cloud computing (CC) seeks to achieve new levels of efficiency in service delivery. Security and privacy are key factors that slow down the rapid and widespread adoption and deployment of both IoT and cloud computing. In the proposed model, an integrated IoT system with cloud computing was developed starting from the analysis, and design, to the implementation to connect IoT devices with the cloud, the security is achieved by using a hybrid encryption mechanism which provides the performance advantages of symmetric and asymmetric encryption algorithms. Where the Elliptic Curve Cryptography (ECC) algorithm is used for key generation and AES (Advanced Encryption Standard) algorithm is used for encryption and decryption of the sensors' data to provide a reliable computing environment. We have implemented the proposed system and showed the results of using CONTIKI COOJA 3.0 that connected with the cloud service provider, Evaluate a set of performance metrics such as power consumption, packet delivery ratio, and the algorithm execution time, in addition to verifying network immunity against the black hole attack.","PeriodicalId":443735,"journal":{"name":"DESIGN, CONSTRUCTION, MAINTENANCE","volume":"77 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"DESIGN, CONSTRUCTION, MAINTENANCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37394/232022.2023.3.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wireless Sensor Network (WSN) is an essential technology in many Internet of Things (IoT) applications, and since sensor nodes suffer from limited resources, it has become possible to overcome storage capacity problems using cloud computing, the integration of Internet of Things (IoT) with cloud computing (CC) seeks to achieve new levels of efficiency in service delivery. Security and privacy are key factors that slow down the rapid and widespread adoption and deployment of both IoT and cloud computing. In the proposed model, an integrated IoT system with cloud computing was developed starting from the analysis, and design, to the implementation to connect IoT devices with the cloud, the security is achieved by using a hybrid encryption mechanism which provides the performance advantages of symmetric and asymmetric encryption algorithms. Where the Elliptic Curve Cryptography (ECC) algorithm is used for key generation and AES (Advanced Encryption Standard) algorithm is used for encryption and decryption of the sensors' data to provide a reliable computing environment. We have implemented the proposed system and showed the results of using CONTIKI COOJA 3.0 that connected with the cloud service provider, Evaluate a set of performance metrics such as power consumption, packet delivery ratio, and the algorithm execution time, in addition to verifying network immunity against the black hole attack.
使用混合加密改进物联网和云计算的集成
无线传感器网络(WSN)是许多物联网(IoT)应用中的基本技术,由于传感器节点的资源有限,因此使用云计算来克服存储容量问题成为可能,物联网(IoT)与云计算(CC)的集成寻求在服务交付中实现新的效率水平。安全和隐私是阻碍物联网和云计算快速和广泛采用和部署的关键因素。在该模型中,从分析、设计到实现,构建了一个与云计算集成的物联网系统,将物联网设备与云连接起来,通过使用混合加密机制来实现安全性,该机制提供了对称和非对称加密算法的性能优势。其中使用ECC (Elliptic Curve Cryptography)算法生成密钥,使用AES (Advanced Encryption Standard)算法对传感器数据进行加解密,提供可靠的计算环境。我们已经实现了所提出的系统,并展示了使用连接云服务提供商的CONTIKI COOJA 3.0的结果,评估了一组性能指标,如功耗,数据包传输率,算法执行时间,以及验证网络对黑洞攻击的免疫力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信