| Literature DB >> 35721416 |
Abstract
The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive information. Existing algorithms for providing security in such networks do not consider all the security objectives. Starting from the sensing of data from IoT environment, the data have to be protected from several types of attacks. Also, the authentication of involved entities, integrity of data, access control and confidentiality are to be achieved. This work proposes a novel security architecture for IoT based distributed applications. The architecture uses the best known lightweight cipher ChaCha20. Principles of cellular automata are applied for random number generation to attain more security and randomness. Double encryption ensures multilevel protection of data during the data uploading and storing phases. Providing encryption based on dynamic session keys guarantees the security of the method. It also ensures secure data sharing, mutual authentication between communicating entities, fast execution, user authentication and message integrity. The IoT device connected to a gateway node has to complete registration phase successfully. Subsequently, each time a data transfer between the device and gateway node takes place, mutual authentication phase is executed. Blockchain network used at the edge level ensures authentication of participating nodes and hence, unintended modification of data is prevented. The proposed architecture proves to be efficient in terms of throughput, execution time and resistance to various security attacks. ©2022 Ali and Mathew.Entities:
Keywords: Blockchain for IoT security; Cellular automata based Random number generation; ChaCha20 cipher; Dynamic group key generation; IoT security
Year: 2022 PMID: 35721416 PMCID: PMC9202632 DOI: 10.7717/peerj-cs.989
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Figure 1Proposed system workflow.
Figure 2Random number generation using rule 30 of cellular automata.
Figure 3Input and quarter round function of ChaCha 20 cipher.
Figure 4Time taken for random number generation using CA.
Figure 5Comparison of stream ciphers based on key-keystream avalanche effect.
Figure 6Comparison based on execution time taken for encryption.
Figure 7Comparison based on throughput PeerJ.
Figure 8Comparison between ChaCha20 and CA-based ChaCha20.
Figure 9Comparison of key exchange methods.