سیستم رمزنگاری در زمینه اینترنت اشیا
ترجمه نشده

سیستم رمزنگاری در زمینه اینترنت اشیا

عنوان فارسی مقاله: سیستم رمزنگاری برای برنامه های کاربردی داده ها، در زمینه اینترنت اشیا
عنوان انگلیسی مقاله: Cryptographic system for data applications, in the context of internet of things
مجله/کنفرانس: ریزپردازنده ها و میکروسیستم ها - Microprocessors And Microsystems
رشته های تحصیلی مرتبط: کامپیوتر، فناوری اطلاعات
گرایش های تحصیلی مرتبط: اینترنت و شبکه های گسترده، امنیت اطلاعات، مهندسی نرم افزار، مهندسی الگوریتم ها و محاسبات، مدیریت سیستم های اطلاعات، معماری سازمانی
کلمات کلیدی فارسی: اینترنت اشیا (IoT)، استاندارد رمزنگاری پیشرفته، UDOO Neo board ،GCM ،GMAC، رمز یک بار مصرف (OTP)، احراز هویت دو مرحله ای، سیستم امنیتی
کلمات کلیدی انگلیسی: Internet of things (IoT)، AES، GMAC، GCM، UDOO Neo board، One time passwords (OTP)، Two factor authentication، Security system
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
نمایه: Scopus - Master Journals List - JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.micpro.2019.102921
دانشگاه: Delft University of Technology (TU Delft), Netherlands
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2020
ایمپکت فاکتور: 1/434 در سال 2019
شاخص H_index: 33 در سال 2020
شاخص SJR: 0/264 در سال 2019
شناسه ISSN: 0141-9331
شاخص Quartile (چارک): Q3 در سال 2019
فرمت مقاله انگلیسی: PDF
تعداد صفحات مقاله انگلیسی: 12
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E14364
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست انگلیسی مطالب

Abstract


1- Introduction


2- Internet of things technology: towards to a new era


3- Privacy and cryptography primitives


4- Security level and implementation devices


5- Selected IoT board 6. Proposed cryptographic system


7- Proposed IoT system implementation


8- Implementations results and comparisons


9- Conclusions & outlook


References

نمونه متن انگلیسی مقاله

Abstract


With each passing day, Internet of Things (IoT), has the potential to transform our society to a more digital way. In this paper, a cryptographic system is proposed, which has been designed and implemented, following the IoT optimized technologies. As the benefits of IoT are numerous, the need for a privacy platform is more than necessary to be developed. This work aims to demonstrate this by, firstly, implementing efficient and flexible, the fundamentals primitives of cryptography and privacy. Secondly, this is achieved, by introducing applied cryptography, in a more interactive and flexible approach. The proposed system and the incorporation of this platform is scrutinized. In the context of this work, an application of symmetric cryptography is introduced, based on the Advanced Encryption Standard (AES) in Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Counter (CTR) modes of operation, for both encryption and decryption of texts, images and electronic data applications. In addition two other security schemes are supported by the proposed system: AES Galois/Counter Mode (GCM) and AES Galois Message Authentication Code (GMAC). The GCM proposed integration, in an authentication scheme, designed to provide authenticity and confidentiality, at the same time. On the other hand, GMAC, can be applied as message authentication code. Both operations, are optimized in sense of implementation resources, since the major cost is targeted to AES core. In addition, based on the integrated hardware modules, user registration and validation is proposed and implemented, with no additional cost, and with no performance penalty. Furthermore, two factor authentication has been designed and proposed, based on One Time Passwords (OTP), which can been produced with a random procedure. After these, a reference to the security levels, as regards to the communication between the IoT layers of the architecture, is presented. IoT hardware platforms are facing lack of security level and this brings the opportunity to use advanced security mechanisms. Implementation comparison results emphasize the importance of testing and measuring the performance of the alternative encryption algorithms, supported by hardware platforms.


Introduction


Nowadays, the development of Internet is being shaped mostly by instant data exchange. The pattern of device usage in an extensive and exhaustive way, is giving ability to the users, in order to communicate and share information. For this reason, the need for protecting the devices and the information dissemination among them, is determined as mandatory. Internet of Things (IoT), can be described as an application domain that integrates different technological and social fields [1]. Furthermore, IoT can bring together cryptographic models and security schemes, for implementation purposes, as described in [2]. For example, IoT systems can be based on AES, ECB and CBC modes of operation for symmetric encryption. Other algorithms such as RSA, SHA standards DiffieHellman and Elliptic Curve Cryptography (ECC), can serve as supplemented privacy schemes, for asymmetric cryptography. Embedded systems design, are usually based on microprocessors, and microcontrollers. The role of embedded systems is to perform specific tasks such as sampling sensors and provide cost effectiveness and high portability, due to their small sizes. It is worthwhile mentioning, that these devices are discretized in how they interpret data. Moreover, they can be utilized for different applications as they are able to be programmable, flexible and can further be applicable to IoT environments. 

  • اشتراک گذاری در

دیدگاه خود را بنویسید:

تاکنون دیدگاهی برای این نوشته ارسال نشده است

سیستم رمزنگاری در زمینه اینترنت اشیا
نوشته های مرتبط
مقالات جدید
لوگوی رسانه های برخط

logo-samandehi

پیوندها