Implementation of Cryptographic Algorithm on IoT Device’s ID
Abstract
Data security is one of many problems that we face in IoT implementation. One of the problems with data security is we cannot assure that the data we received in the server-side is truly our data that we send from client-side or sensor-side. With that problems, comes some solutions like encryption and decryption method or some basic authentication planted on the server-side. In this research, we propose some encryption and decryption method that can be easily implemented on both server and sensor-side and then we analyze the complexity of its algorithm. This research aims to create some authentication process for the data that server-side receive from the sensor-side by creating encrypted ID consisting of 6 digits of alphanumeric and useful for identification process in system, so the server can recognize the data and validate it.
Downloads
References
K. Rose, S. Eldridge, and L. Chapin, “THE INTERNET OF THINGS: AN OVERVIEW. Understanding the Issues and Challenges of a More Connected World.,” Internet Soc., no. October, p. 80, 2015.
X. F. Wang, “Research on Security Issues of the Internet of Things,” 4th Int. Conf. Mater. Sci. Inf. Technol. MSIT 2014 989-994, vol. 994, pp. 4261–4264, 2014.
A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A Systemic Approach for IoT Security,” 2013 IEEE Int. Conf. Distrib. Comput. Sens. Syst., no. May, pp. 351–355, 2013.
R. Yegireddi and R. K. Kumar, “A survey on conventional encryption algorithms of Cryptography,” Proc. 2016 Int. Conf. ICT Business, Ind. Gov. ICTBIG 2016, 2017.
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey,” Secur. Distrib. Grid, Mobile, Pervasive Comput., pp. 367–410, 2007.
M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., vol. 82, pp. 395–411, 2018.
W. Xue, C. Luo, G. Lan, R. Rana, W. Hu, and A. Seneviratne, “Kryptein: A Compressive-sensing-based Encryption Scheme for the Internet of Things,” Proc. 16th ACM/IEEE Int. Conf. Inf. Process. Sens. Networks, pp. 169–180, 2017.
M. Samaniego and R. Deters, “Blockchain as a Service for IoT,” Proc. - 2016 IEEE Int. Conf. Internet Things; IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, pp. 433–436, 2017.
A. Bahga and V. K. Madisetti, “Blockchain Platform for Industrial Internet of Things,” J. Softw. Eng. Appl., vol. 09, no. 10, pp. 533–546, 2016.
S. Huh, S. Cho, and S. Kim, “Managing IoT devices using blockchain platform,” Int. Conf. Adv. Commun. Technol. ICACT, pp. 464–467, 2017.
J. Ellul and G. J. Pace, “AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things,” 2018 9th IFIP Int. Conf. New Technol. Mobil. Secur. NTMS 2018 - Proc., vol. 2018–Janua, pp. 1–4, 2018.
N. C. Pratama, M. A. Murti, and R. Mayasari, “SISTEM AUTOKONEKSI PERANGKAT CERDAS YANG DITERAPKAN PADA SISTEM PENGAWASAN DAN KONTROL DENGAN MENGGUNAKAN INTERNET OF THINGS,” J. Penelit. dan Pengemb. Telekomun. Kendali, Komputer, Elektr. dan Elektron., vol. 1, no. 2, 2016.
R. Vaz, “Automated Big-O Analysis of Algorithms,” pp. 2–7, 2017.
M. Kayam, M. Fuwa, H. Kunimune, M. Hashimoto, and D. K. Asano, “Assessing your algorithm: A program complexity metrics for basic algorithmic thinking education,” ICCSE 2016 - 11th Int. Conf. Comput. Sci. Educ., no. Iccse, pp. 309–313, 2016.
C. C. E. Leiserson, R. R. L. Rivest, C. Stein, and T. H. Cormen, Introduction to Algorithms, Third Edition, 3rd ed., vol. 7, no. 3. London: The MIT Press, 2009.





