Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Author:

Hasan Mohammad Kamrul1ORCID,Shafiq Muhammad2,Islam Shayla3ORCID,Pandey Bishwajeet4,Baker El-Ebiary Yousef A.5ORCID,Nafi Nazmus Shaker6,Ciro Rodriguez R.7ORCID,Vargas Doris Esenarro8

Affiliation:

1. Center form Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor, Malaysia

2. Cyberspace Institute of Advanced Technology, Guanghzou University, Gaungzhou, China

3. Institute of Computer Science and Digital Innovation, UCSI University, 56000 Kuala Lumpur, Malaysia

4. Department of Computer Science and Engineering, Birla Institute of Applied Science, Bhimtal, India

5. Faculty of Informatics and Computing, University Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia

6. School of IT and Telecommunication Engineering, Melbourne Institute of Technology, Melbourne, Australia

7. School of Software Engineering, National University Mayor de San Marcos, Lima, Peru

8. Universidad Nacional Federico Villarreal UNFV(INERN), Lima, Peru

Abstract

As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and control their behavior accordingly. As evident, these machines use sensors to collect vital information, which is then the complexity analyzed at a computational node that then smartly controls these devicesʼ operational behaviors. Deep learning-based guessing attack protection algorithms have been enhancing IoT security; however, it still has a critical challenge for the complex industries’ IoT networks. One of the crucial aspects of such systems is the need to have a significant training time for processing a large dataset from the networkʼs previous flow of data. Traditional deep learning approaches include decision trees, logistic regression, and support vector machines. However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. It presents a deep analysis of AES, DES, 3DES, RSA, and Blowfish based on timing complexity, size, encryption, and decryption performances. It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. The assessment has been done using the simulation approach and it has been tested the speed of encryption and decryption of the selected encryption algorithms. For each encryption and decryption, the tests executed the same encryption using the same plaintext for five separate times, and the average time is compared. The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. For the experimental test, a set of plaintexts is used in the simulation—password-sized text and paragraph-sized text—that achieves target fair results compared to the existing algorithms in real-time deep learning networks for IoT applications.

Funder

Universiti Kebangsaan Malaysia

Publisher

Hindawi Limited

Subject

Multidisciplinary,General Computer Science

Cited by 65 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications;Computers in Human Behavior;2024-04

2. Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction;Journal of Network and Computer Applications;2024-01

3. Cache attacks on subkey calculation of Blowfish;Journal of Computer Security;2023-11-15

4. The Role of Cybersecurity in E-Commerce to Achieve the Maqasid of Money;2023 International Conference on Computer Science and Emerging Technologies (CSET);2023-10-10

5. A Review of Effectiveness and Efficiency Methodology of Decision Support System for Selecting Suppliers;2023 International Conference on Computer Science and Emerging Technologies (CSET);2023-10-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3