
Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No.12, 2018 Improved Reconfigurable based Lightweight Crypto Algorithms for IoT based Applications Dr.G. Mohammed Gouse, Assistant Professor, Department of Computer Networking, College of Engineering and Computer Science, Lebanese French University, Erbil, Iraq. E-mail: [email protected] Chiai Mohammed Haji, Lecturer, Department of Information Technology, College of Engineering and Computer Science, Lebanese French University, Erbil, Iraq. E-mail: [email protected] Dr. Saravanan, Assistant Professor, Debre Berhan University, Debre Berhan, Ethiopia. E-mail: [email protected] Abstract--- Internet of Things (IoT) based devices were integrated with most of the present-day activities and applications. IoT combines various heterogeneous devices along with security, privacy, communication and computing. Different malicious attacks, Denial of Service (DoS) and hacking the information are possible to collapse the IoT network. Traditional security and authentication algorithm for secure communication will not properly fit with present IoT situation. To address this issue, this paper focuses on lightweight crypto algorithms with improved configurations. This proposed algorithm concentrates on Generalized Feistel cipher along with pipeline mechanism. Experiments are targeted to reconfigurable device such as Field Programmable Gate Array (FPGA) and compared with various existing methods in terms of hardware resource utilization, maximum frequency and power. Experimental results show that proposed method will be well fit with IoT based applications in terms of high throughput, low power activity and more efficient. Keywords--- Lightweight Crypto Algorithms, Information Security, Feistel Cipher, FPGA, Internet of Things (IoT). I. Introduction Internet of Things (IoT) based applications and innovations are growing rapidly without any boundaries. It helps in creating communication between dissimilar of various devices in heterogeneous environment. IoT also provides more comfort to the user by maintaining various secure services like confidentiality, authentication, integrity and authorization. These services give trust on transit information, verified received data, prevent intruder in modifying original data and better authentication to access the resources. Internet based communication connects low power resources with different nature of devices and computes process to achieve the task in the network. Due to the huge number of communications, it is necessary to trust the security of information. Possible of threat may result in this heterogenous device based secure communication. IoT is influenced by number of attacks like man in middle attack, saturation attack, related key attack, differential attack and Denial of Service (DoS) attack. These attacks will collapse the devices physically and damage the network communication and leads to unauthorized access. So, providing better authentication, confidentiality, low power devices and integrity of information are the main challenging task of future IoT. Security Architecture of IoT reference model is shown in table 1. It contains 7 basic layer and have an inside view of security protocols, various attacks, basic security, target and activities. In the physical layer, IEEE 802.15.4 and MAC of IoT are considered as security protocol. It gets the real time signals from sensors and devices like GPRS and RFID. Basic IoT security provided by random number generator. Jamming and battery exhausted attacks are considered in this layer. In the data link layer, ATM and FDDI kind of protocols are used. Collision and spoofing attacks are possible in this IoT layer. In the network layer, Internet protocol like IPv6 and IP routing are functioning. Basic IoT security can be provided in key management to prevent replay attack. In the transport layer, UDP and DTLS security protocols are considered. It provides basic IoT security in encryption and also prevent data flooding attack. In the session layer, NFS and SCP related authentication protocols are used. Efficient authentication provides for IoT security. Data aggregation is possible attack IoT. In the presentation layer, DNS and HTTP based protocols are considered for various applications. For secure IoT, this layer provides anti-virus compatible to avoid data diverse attack. In the application layer, various security protocols like COAP, XMPP and AMQP are used. For better IoT security, network firewall is provided to prevent application data process attack. Thus, the above observation gives overall view of various attacks in all the layers of secure IoT reference model. ISSN 1943-023X 186 Received: 23 October 2018/Accepted: 21 November 2018 Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No.12, 2018 Table 1: Security Architecture of IoT Reference Model Layer Security Protocol Attacks Basic Security Target Activities Application COAP, MQTT, Depend on protocol Network Firewall People and Transformational decision based Layer XMPP, AMQP Process on thing apps and data Presentation DNS, Date Diverse Anti-virus Applications Custom Apps built using thing Layer HTTP data Session Layer NFS, Data Aggregation Authentication Data Analysis Reporting, Mining, Aggregation SCP Distortion Transport UDP, DTLS Flooding attack Encryption Data Ingestion Big Data, Storage of Thing Data Layer Network Layer IPv6, Replay attack Key management Global Cloud infrastructure – public, IP routing Infrastructure private Data Link ATM, Collision attack, Trust Zone Connectivity Communication protocols, Layer FDDI Spoofing attack Computing M2M, Wi-fi Physical Layer IEEE 802.15.4 Jamming, Battery Random number Things Devices, MAC exhaustion generator Sensors, controllers To address the need of secure communication, various cryptographic algorithms are considered. Basic structure of cryptographic algorithms is classified into symmetric and asymmetric algorithms. In symmetric cryptographic algorithm, single private key is used for security purpose. Sender and receiver uses the same private key for secure communication. It gives better confidentiality and integrity on transit data with less number of keys but fails to provide better authentication. AES, DES, IDEA, Blowfish are considered as traditional symmetric cryptographic algorithms. In asymmetric cryptographic algorithm, public and private key is used for secure communication. It provides better confidentiality, integrity and authentication but increases the complexity of the algorithm by large key size. RSA, Diffie Helmen, Hash functions, Elliptic curve cryptography are famous asymmetric algorithms. General procedure of symmetric and asymmetric cryptographic algorithms not able to integrate with IoT based environment due to consumption of more power, more memory and more computational resources. So, it is necessary to incorporate smart cryptographic algorithms with low power activity, low memory and better computational resources. To address this issue, lightweight based security algorithms are considered. Lightweight solution is known as in terms of less key size, less memory usage and speed in process. Various block cipher like Feistel, Substitution and Permutation Network (SPN), EDFN are considered depends upon their internal arrangements of plain text and key combinations. Feistel structure [28] divides the plain text into two equal-half of data and proceed each round. For decryption process, it uses the same program code of encryption functionality with help of reverse key logic. Thus, it reduces the additional hardware and resource implementation. Feistel cipher is basically classified as Generalized Feistel structure and Classical Feistel structure. For better security, more number of rounds is considered in Generalized Feistel structure. SIMON [17], HISEC [43], GIFT [10], GRANULE [9], DLBCA [11], LiCi [12] are some popular Feistel networks. Substitution and Permutation Networks (SNP) based operations are achieved by series of mathematical link process. In substitution function, non-linear look-up table-based S-Box operation is performed. In permutation function, invertible linear transformation operation is considered. LED [19], PRINCE [40], RECTANGLE [16], MANTIS [33], GIFT [10] are some of widely used SPN based block ciphers. Table 2 shows various popular lightweight cryptographic algorithms. It projects the structure of lightweight, number of rounds which is used in permutation, key size, block size and possible attacks. Table 2: Popular LIGHTWEIGHT Cryptographic Algorithms Lightweight Algorithm Structure Number of rounds Key size Block size Possible Attacks LED [19] SPN 32 64 64 Dedicated attack PRINCE [40] SPN 12 128 64 Saturation attack SIMON [17] Feistel 32 64 32 Differential attack HISEC [43] Feistel 15 80 64 Collision attack RECTANGLE [16] SPN 25 80 / 128 64 Slide attack MANTIS [33] SPN 10 / 12 128 64 Meet-in-the-attack Lilliput [8] EGFN 30 80 64 Differential attack GIFT [10] SPN 28 / 40 128 64 / 128 Less robust SIT [42] Feistel + SPN 5 64 64 Schedule attack Granule [9] Feistel 32 128 64 Slide attack DLBCA [11] Feistel 15 80 32 Key attack LiCi [12] Feistel 31 128 64 Collision attack ISSN 1943-023X 187 Received: 23 October 2018/Accepted: 21 November 2018 Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No.12, 2018 II. Related Works Lightweight cryptographic algorithms attract more attention due to the demand of Internet of Things (IoT). In this present decade, many researchers address the various solutions to this particular
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-