A New Lightweight Cryptosystem for IoT in Smart City Environments

Main Article Content

Firas Hazzaa
Md Mahmudul Hasan
Akram Qashou
Sufian Yousef

Abstract

Internet of Things (IoT) devices, user interfaces (UI), software, as well as communication networks are all deployed within Smart Cities topology. The security approach designed for Internet of Things IoT should be able to prevent and detect both internal and external attacks. The problem in IoT network that not every linked node or device has an adequate amount of processing power. This means that data encryption and other related activities will be impossible and means that the security of any kind must be lightweight. A trustworthy security solution that stops illegal access to private data on the network is necessary for maintaining the privacy of information on the Internet of Things. Cryptographic processes need to be quicker and more compact without sacrificing security. The aim of this study is to reduce the execution time and power consumption of encryption processes without compromise the complexity of the encryption algorithm. This research presents a new lightweight cryptographic technique to protect various multimedia and real-time traffics across IoT network, by using two S-box in SubByte of encryption process, without affecting its performance.  In this study, different audio samples will be used to test the new algorithm efficiency. Comparing the suggested method to the most advanced standard algorithm, it can reduce the cryptography process's execution time as well as energy consumption while maintaining the required security level. The outcomes demonstrate good performance in terms of power usage and delay. The new technique consumed a roughly 0.2 µJ for encryption process while the typical AES algorithm consumed 0.29 µJ, this mean the new algorithm achieved (33% power savings), while maintaining a good complexity level (security) within the process of encryption according to the results in tables I, II, and the comparison in table III. The novelty of this work can be showed by using dual XOR S-box technique which increased the complexity of SubByte process making it more secure without overload the processing performance, in addition to the reduction in encryption rounds which contribute to enhance the performance without compromise the security. Making it more suited for the Internet of Things (IoT) used in smart city environments.

Downloads

Download data is not yet available.

Article Details

How to Cite
Hazzaa, F., Hasan, M. M., Qashou, A., & Yousef, S. (2024). A New Lightweight Cryptosystem for IoT in Smart City Environments. Mesopotamian Journal of CyberSecurity, 4(3), 46–58. https://doi.org/10.58496/MJCS/2024/015
Section
Articles

References

S. Morgan, "Cyber Security Cost," Forbes, available online on: https://www.forbes.com/sites/stevemorgan, US, 2022.

M.A.F. Al-Husainy, B. Al-Shargabi, S. Aljawarneh “Lightweight cryptography system for IoT devices using DNA” Comput. Electr. Eng., 95 (2021), Article 107418.

Firas Hazzaa, Antesar M. Shabut, Nada Hussein M. Ali, Marcian Cirstea, Security Scheme Enhancement for Voice over Wireless Networks, Journal of Information Security and Applications,Volume 58, (2021) , ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2021.102798.

M. Masoumi and M. H. Rezayati, "Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 10, no. 2, pp. 256-264. [available online]: (www.ieeexplore.ieee.org), Digital Library, February 2015.

L. S. Abhiram, B. K. Sriroop and H. L. Punith.Kumar , "FPGA implementation of dual key based AES encryption with key Based S- Box generation," India, 2015.

Y. Li, J. Liu, and Y. Jiang. "TinyCrypt: A Small Footprint Cryptographic Library for Low-Power IoT Devices." IEEE Internet of Things Journal, vol. 6, no. 1, pp. 768-779, Feb. 2019. DOI: 10.1109/JIOT.2018.2876226

M. Ali, T. Javed, F. A. Sheikh, and S. Aslam. "Lightweight Cryptography for Resource-Constrained IoT Devices: A Review and Future Perspectives." IEEE Access, vol. 9, pp. 167471-167497, Nov. 2021.

OKAMURA Toshihiko, Lightweight Cryptography Applicable to Various IoT Devices, Vol.12 (2017) No. 1 Special Issue on IoT That Supports Digital Businesses /www.nec.com/ .

J. Wang, Q. Gao, P. Cheng, Y. Yu, “Lightweight Robust Device-Free Localization in Wireless Networks," IEEE Transactions on Industrial Electronics, IES, vol. 61, no. 10, 2014.

Abutaha, M., Atawneh, B., Hammouri, L. et al. Secure lightweight cryptosystem for IoT and pervasive computing. Sci Rep 12, 19649 (2022).

H. Albonda, S. Tapaswi, S. Yousef and M. Cole, "The impact of mobility and node capacity on voice traffic," International Journal of System Assurance Engineering and Management, vol. 8, no. 33, pp. 1 - 9, March 2017.

Ahmed Saihood, Al-Shaher, M. Fadhel, " A New Tiger Beetle Algorithm for Cybersecurity, Medical Image Segmentation and Other Global Problems Optimization," Mesopotamian journal of Cybersecurity 4(1), pp. 17–46, 2024.

s. Cheng, P. Chen and C. Lin, "Traffic-Aware Patching for Cyber Security in Mobile IoT," IEEE Communications Magazine, vol. 55, no. 7, pp. 29 - 35, 2017.

W. Hu and Cao, "Quality-Aware Traffic Offloading in Wireless Networks," IEEE TRANSACTIONS ON MOBILE COMPUTING, vol. 16, no. 11, March 2017.

A. Msolli, A. Helali and H. Maaref, "Image encryption with the AES algorithm in wireless sensor network," Tunisia, July 2016.

Bansod, G., Raval, N. & Pisharo, N., 2015. Implementation of a New Lightweight Encryption Design for Embedded Security. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 10(1), pp. 142-151.

Qashou, A., Yousef, S., Okoro, A. and Hazzaa, F. (2023), "Microgrid TestBed for Temporal Forecasting Patterns of Failure for Smart Cities", Technology and Talent Strategies for Sustainable Smart Cities, Emerald Publishing Limited, Leeds, pp. 189-227. https://doi.org/10.1108/978-1-83753-022-920231010

Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends," in Proceedings of the IEEE, vol. 104, no. 9, pp. 1727-1765, Sept. 2016.

Emmanouis and Christos, "Security model for emergency real-time communications in autonomous networks," Springer- Information Systems Frontiers, A Journal of Research and Innovation, vol. 14, no. 3,pp.541–553[online]:https://link.springer.com/article/10.1007/s10796-010-9259-8, 2012.

Alamsyah, A. Bejo and T. Adji, "AES S-box construction using different irreducible polynomial and constant 8-bit vector," Taiwan, 2017.

M. Nagendra and M. C. Sekhar, "Performance Improvement of Advanced Encryption Algorithm using Parallel Computing," International Journal of Software Engineering and Its Applications, vol. 8, no. 2, pp. 287-296. [availble online]: https://pdfs.semanticscholar.org/. 2014.

F. Hazzaa, S. Yousef, E. Sanchez and M. Cirstea, "Lightweight and Low-Energy Encryption Scheme for Voice over Wireless Devices," IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, 2018, pp. 2992-2997.

Sahu, S. K. & Kushwaha, A., 2014. Performance analysis of Symmetric Encryption algorithm for Mobile ad hoc networks. International Journal of Emerging Technology and Advanced Engineering, 4(6), pp. 619-624.

A. Prakash, M. Satish, T. Sai and M. G., "Improving Cloud Security Using Multi Level Encryption and Authentication," International Journal of Innovative Research in Information Security (IJIRIS), vol. 2, no. 8, pp. 1-8, Aug. 2015.

D. Salama and M. Hadhoud, "Evaluating the effect of symmetric Algorithms on Power consumption for Different Data types," International Journal of Network Security, vol. 11, no. 2, pp. 78-87, 2010.

F. Hazzaa, S. Yousef, N. H. Ali and E. Sanchez, "The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network," 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3),pp. 209-212, London, United Kingdom, 2019.

Stallings, W., Cryptography and Network Security: Principles and Practice (7th Edition). 7 th ed. Harlow- England: Pearson Education Limited, 2017.

B. Mohd, T. Hayajneh, A. Vasilakos "A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues" Journal of Network and Computer Applications, vol. 58, pp. 73-93, 2015.

G. Bansod, N. Raval and N. Pisharo, "Implementation of a New Lightweight Encryption Design for Embedded Security," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 10, no. 1, pp. 142-151, 2015.

Behnam Dezfouli, I. Amirtharaj, C. Li, “An energy measurement platform for wireless IoT devices," Journal of Network and Computer Applications, vol. 121, pp. 135-148, 2018.

F. Hazzaa and S. Yousef, "Performance Analysis for Traffics in Mobile Ad Hoc Network," in 11th International Conference on Global Security, Safety & Sustainability ICGS3 - Springer International Publishing AG, London, 2017.

A. Popov, "Prohibiting RC4 Cipher," Internet Engineering Task Force, WA, USA, 2015.

P. Gope, T. Hwang, " A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application in WSN," IEEE Transactions on Industrial Electronics, Industrial Electronics Society, vol. 63, no. 11, pp. 7124-7132, 2016.

Z. A. Abduljabbar, A. Ibrahim, M. A. Al Sibahee, S. Lu and S. M. Umran, "Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data," 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 2021, pp. 1397-1398, doi: 10.1109/COMPSAC51774.2021.00202.