{"title":"使用TwoFish和DHE在物联网节点之间进行安全数据交换","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00024","DOIUrl":null,"url":null,"abstract":"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"293 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE\",\"authors\":\"B. Asare, Kester Quist-Aphetsi, Laurent Nana\",\"doi\":\"10.1109/ICSIoT47925.2019.00024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment\",\"PeriodicalId\":226799,\"journal\":{\"name\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"volume\":\"293 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIoT47925.2019.00024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE
Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment