使用TwoFish和DHE在物联网节点之间进行安全数据交换

B. Asare, Kester Quist-Aphetsi, Laurent Nana
{"title":"使用TwoFish和DHE在物联网节点之间进行安全数据交换","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00024","DOIUrl":null,"url":null,"abstract":"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"293 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE\",\"authors\":\"B. Asare, Kester Quist-Aphetsi, Laurent Nana\",\"doi\":\"10.1109/ICSIoT47925.2019.00024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment\",\"PeriodicalId\":226799,\"journal\":{\"name\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"volume\":\"293 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIoT47925.2019.00024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

物联网的存在主要是为了与中央存储或数据中心收集、分析和通信数据。还可以使用硬件防火墙和网络安全协议来支持可靠的数据通信,以处理和减轻这些硬件设置中发生的安全漏洞。不安全的数据本身对包括无线传感器网络在内的数据通信网络构成威胁。加密算法继续为数据提供急需的安全框架,以防止对数据的未经授权访问。一个强大的加密密码,防止敏感数据文件和关键信息变得容易受到网络攻击。传感器节点在计算能力和功率方面受到限制,但它们应该能够自主运行几个小时。这里的挑战是确定和实现一个可靠的框架,该框架可以保护云计算环境(如物联网(IoT))中节点之间的数据交换。有几种可用的加密算法,它们使用文本、数字和符号的组合作为密钥,将明文转换为密文,从而防止数据和其他关键信息落入不法分子和未经授权的人手中。我们提出了一种理想的混合加密算法,以确保物联网环境中节点之间通信的数据安全
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE
Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信