ENHANCING THE SECURITY OF IoT DATA USING MULTILEVEL ENCRYPTION

Main Article Content

A Vithya Vijayalakshmi
Dr. L. Arockiam

Abstract

Internet of Things (IoT) plays a vital role in the field of Information Technology, Industries and Healthcare etc. As data in IoT applications will be related to the physical realm, ensuring data security is a primary constraint for many cases. Because in the IoT context not only users, but also authorized objects may access data. Security represents a critical component for enabling the widespread adoption of IoT technologies and applications. Therefore this paper proposes a multilevel encryption technique to enhance the security of the IoT data. In this approach the data sensed from the IoT devices are encrypted in the gateway using Merkle-Hellman encryption and Elliptic Curve Cryptography (ECC) to ensure the security of the data.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Isha and Ashish Kr. Luhach, “Analysis of Lightweight Cryptographic Solutions for Internet of Thingsâ€, Indian Journal of Science and Technology, 2016, ISSN: 0974-6846, Vol. 9. Iss.28, pp. 1-7.

P. Nandhini and Dr.V.Vanitha, “A Study of Lightweight Cryptographic Algorithms for IoTâ€, International Journal of Innovations and Advancement in Computer Science, 2017, ISSN: 2347-8616, Vol.6, Iss.1, pp. 26-35.

S.D.Pingle, “A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptographyâ€, International Journal of Scientific Research and Education, 2016, ISSN: 2321-7574, Vol.4, Iss.5, pp. 5294-5301.

Arghya Roy and Santhoshi Bhat, “Enhancement of Merkle-Hellman Knapack Cryptosystem by use of Discrete Logarithmicsâ€, International Journal of Scientific and Research Publications, 2013, ISSN: 2250-3153, Vol.3, Iss.4, pp. 1-4.

Koblitz. N, “Elliptic Curve Cryptosystemsâ€, Mathematics of Computation, 1987, Vol. 48, Iss. 177, pp. 203-209.

Miller. V, “Use of Elliptic Curves in Cryptographyâ€, CRYPTO’85, Springer-Verlag, 1986, pp.417-426.

Laiphrakpam Dolendra Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptographyâ€, Elsevier, Internation Multi-Conference on Information Processing, 2015, pp. 1 -10.

Alfred J.Menezes, Paul C.van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptographyâ€, Massachusetts Institute of Technology, 1996.

Daisy Premila Bai T, Albert Rabara S and Vimal Jerald M, “Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computingâ€, Recent Advances on Computer Engineering, 2015, pp. 1 -10.

Mailov Arif, Abbasov Habib, Isayev Rufat and Safaeov Azer, “Study and Implementation of Elliptic Curve Encryption Algorithm for Azerbaijan E-ID Cardâ€, 2015, ISSN: 2320-9798, Vol.3, Iss. 5, pp. 3708-3713.