research centers


Search results: Found 2

Listing 1 - 2 of 2
Sort by

Article
Internet of Things Security using New Chaotic System and Lightweight AES

Authors: Jolan Rokan Naif --- Ghassan H. Abdul-majeed --- Alaa K. Farhan
Journal: Journal of Al-Qadisiyah for Computer Science and Mathematics مجلة القادسية لعلوم الحاسوب والرياضيات ISSN: 20740204 / 25213504 Year: 2019 Volume: 11 Issue: 2 Pages: Comp Page 45-52
Publisher: Al-Qadisiyah University جامعة القادسية

Loading...
Loading...
Abstract

The Internet of Things (IoT)services and application were increasing during the last years in several life fields causes need to provide a secure identifier for protecting sensing data passing between IoT sensors/devices and embedded-subsystem connected by networks. This paper was proposed an algorithm for helping in IoT communication security can used in different IOT entities used in unofficial industrial machine to machine (M2M) communications, smart energy-grids, home or buildings and other computing devices. This paper proposed a secure system using new proposed 4D chaotic system combined with the modified lightweight Advanced Encryption Standard (AES). The proposed 4-dimension (4D) chaos system Lyapunov was tested and pass for many initial periods and get a super chaos system (4 positive Lyapunov). Generated chaos keys (used JORN) were used in the lightweight AES and the Secure Hash Algorithm version 3 (SHA3-256). The Lightweight AES was design in case to reduce CPU computation cycles and complexity of AES. Results show that computation time for proposed system decreased (has 145% speedup more). The output of modified lightweight AES encryption System has the good statistical tests near to original AES that can avoid many attacks.

Keywords

IoT --- IoT security --- AES --- chaos and AES.


Article
Internet of Things Authentication Based on Chaos-Lightweight Bcrypt
التخويل في انترنيت الاشياء بالاعتماد على طريقة التشفير ( chaos-Blowfish ) المحدثة والمخففة

Authors: Jolan Rokan Naif --- Ghassan H. Abdul-majeed --- Alaa K. Farhan
Journal: Journal of Baghdad College of Economic sciences University مجلة كلية بغداد للعلوم الاقتصادية الجامعة ISSN: 2072778X Year: 2019 Volume: 2019 Issue: 8 Pages: 370-385
Publisher: Baghdad College of Economic Sciences كلية بغداد للعلوم الاقتصادية

Loading...
Loading...
Abstract

Abstract—Authentication on IOT is to identify things such as (users, nodes, devices, and data accessing) by authorized manner using private information based on cryptography methods and techniques to provide a robust secure operation over the IoT. Each devises and sensors need to be authorized to connect nodes and other devices for transferring data through the network.This paper proposed new authentication technique between nodes, computing devices, and sensors based on proposed lightweight Bcrypt encryption with 4-D chaos system.The proposed lightweight Bcrypt authentication contain three stages (SHA1-128bit, HMAC 256 -bit, and modified chaos-Blowfish with 128-bit). These three stages modified to be compatible to IOT devices with high speed. For getting a strong hashing security, the four dimension chaotic system (hybrid from Lorenz system with logistic chaotic maps) used to combine with above three stages. Testing results show proposed algorithm passing the NIST tests with CPU cycles in lightweight ranges

التخويل في انترنت الاشياء او في المدن الذكية او البيت الذكي هي تحديد أشياء مثل (المستخدمين ، العقد ، الأجهزة ، والوصول إلى البيانات) بطريقة مخولة باستخدام معلومات خاصة تعتمد على أساليب وتقنيات التشفير لتوفير عملية آمنة قوية عبر إنترنت الأشياء. يجب أن تكون كل الاجهزة والمتحسسات مخولة لربط العقد مع باقي الاجهزة لنقل البيانات عبر الشبكة.في هذا العمل تم اقتراح تقنية تخويل جديدة بين العقد وأجهزة الحوسبة والمتحسسات بالاعتماد على تقنية تشفير مقترحة وهي طريقة التشفير بال Bcrypt الخفيفة مع نظام الفوضى رباعي الأبعاد (4-D chaos system).تحتوي الطريقة المقترحة على ثلاث مراحل وهي ( SHA1-128bit ، HMAC 256-bit ،modified chaos-Blowfish with 128-bit) حيث تم تعديل هذه المراحل الثلاث لتكون متوافقة مع أجهزة IOT بسرعة عالية. للحصول على حماية قوية للتجزئة ، النظام الفوضوي ذو الأبعاد الأربعة المهجن من نظام لورينز مع المعادلة الفوضوية اللوجيستية) يستخدم مع المراحل الثلاث أعلاه. تُظهر نتائج اختبار الخوارزمية المقترحة انها اجتازت اختبارات NIST مع دورات CPU في نطاقات lightweight.

Keywords

component --- formatting --- style --- styling --- insert --- key words

Listing 1 - 2 of 2
Sort by
Narrow your search

Resource type

article (2)


Language

English (2)


Year
From To Submit

2019 (2)