Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32579
Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi


Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: Internet of things, security, hybrid algorithm, privacy.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4045


[1] W. Bruce D, GR. Milne, Y. G. Andonova, and F M. Hajjat. "Internet of Things: Convenience vs. privacy and secrecy." Business Horizons 58, no.6, Science Direct, pp. 615-624, 2015.
[2] R. Davice, ”The Internet of Things Opportunties and challeng”, European, p.p.1-8, 2015.
[3] G. Price, “The Internet of Things 2015”, State of THE Market: Internet of Things 2015, Verison wireless company p. p1-24, 2015.
[4] X. Xingmei, Zh. Jing, W. He, “Research on the Basic Characteristics, the Key Technologies, the Network Architecture and Security Problems of the Internet of Things”, 3rd International Conference on Computer Science and Network Technology (ICCSNT), Dalian, China, IEEE, p.p.825-828, 2013.
[5] Y. Challal, E. Natalizio, S. Sen, and A. Maria Vegni “Internet of Things security and privacy: Design methods and optimization”, Add Hoc Network, vol.32, Science Direct, p.p1-2, 2015.
[6] Ch. Qiang, G. Quan, B. Yu, L. Yang, “Research on Security Issues of the Internet of Things”, International Journal of Future Generation Communication and Networking (IJFGCN), vol.6, NO.6, IEEE, pp 1-10, 2013.
[7] R. Weber, “Internet of Things New security and privacy challenges”, Computer and Low Security Review, vol.26, issue1, Science Direct, p.p. 23-30, 2010.
[8] A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, A. Bouabdallah” A systemic approach for IoT security’, International Conference on Distributed Computing in Sensor Systems (DCOSS), Cambridge, MA, IEEE, p.p.351-355, 2013.
[9] F. Olivier, G. Carlos, N. Florent “New Security Architecture for IoT Network”, Procedia Computer Science, vol.52, Science Direct, p.p1028-1033, 2015.
[10] M. Xin, H. China “A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System”, International Conference on Cyber-Enabled Disributed Computing and Knowledge Discovery, Xian, IEEE, p.p.62-65, 2015.
[11] H. Shafagh, A. Hithnawi” Poster Abstract: Security Comes First, A Publickey Cryptography Framework for the Internet of Things’, International Conference on Distributed Computing In Sensor Systems (DCOSS), Marina Del Rey, CA, IEEE, p.p.135-136, 2014
[12] A. F. Skarmeta, J. L. Hernandez, M. V. Moreno” A decentralized approach for Security and Privacy challenges in the Internet of Things”, IEEE Word Forum on Internet of Things (WF-IOT), Seoul, IEEE, p.p.67-72, 2014.
[13] N. Hong, Z. Xuefeng, “A Security Framework for internet of thingsbased on SM2 cipher algorithm”, Fifth International Conference on Computer Science and Network Technology, Shiyang, Hubia, China, IEEE, p.p13-16, 2013.
[14] R. Arbia, Ya. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. "A systemic approach for IoT security." In 2013¬ IEEE International Conference on Distributed Computing in Sensor Systems, p.p. 351-355. IEEE, 2013.
[15] L. Yuan Zeng, “A Security Framework for Internet of Things Based on 4G communication,-2nd International Conference On computer Science And Network Technology, Chanchun, China, IEEE, p.p1715-1718, 2012.
[16] S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, “Proposed embeded seurity framework for internet of things”, 2nd International Conference on Information Theory and Aerospace & Elentronic Systems Technology, Chennai, IEEE, p.p.1-5, 2011.
[17] K. Nur Prasetyo ST, Y. Purwanto, and D. Darlis. "An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA."In Information and Communication Technology (ICoICT), 2014 2nd International Conference, Bandung, p.p. 75-79. IEEE, 2014.
[18] SB. Vinayaga, M. Ramnath, M. Prasanth, and V. Sundaram. "Encryption and hash based security in Internet of Things." In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference, Chennai, p.p. 1-6. IEEE, 2015.
[19] P. Xu, Li. Min, and He. Yu-Jie. "A hybrid encryption algorithm in the application of equipment information management based on Internet of things." In 3rd International Conference on Multimedia Technology (ICMT-13). Atlantis Press, 2013.
[20] X. Yi Chen, Zh. Gang Jin, “Research on Key Technology and Applications for Internet of Things”, Physics Procedia, vol33, Science Direct, p.p 561-566, 2012.
[21] R. Wuling, and Zh. Miao. "A hybrid encryption algorithm based on DES and RSA in Bluetooth communication.” In Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on Sanya, p.p. 221-225. IEEE, 2010.
[22] R. Jha, A. Kumar saini, ”A Comparative Analysis & Enhancement of NTRU Algorithm for Network Security and Performance Improvement”, International Conference on Communication Systems and Network Technologies, Katra, Jammu, IEEE, p.p.80-84, 2011.