Page 37 - 2024
P. 37
Ph.D.
(Computer Applications)
ENHANCEMENT OF LIGHTWEIGHT CRYPTOGRAPHY TECHNIQUE
FOR IOT DATA TRANSMISSION
Ph.D. Scholar : Patel Ankitkumar Ratilal
Research Supervisor : Dr. Jigneshkumar A. Chauhan
Regi. No.: 19276211003
Abstract :
Millions of connected devices that can sense compute and exchange data using Internet
of Things (IoT). Any physical thing, including a phone, laptop, refrigerator, air conditioner,
charger and many more can be a "smart thing." In this increasing era of intelligent objects,
IoT is an emerging technology. Wireless connections like RFID, Bluetooth, ZigBee, WSN,
WLAN, WMAN, or Wi-Fi can be used to link IoT objects. The Internet of Things (IoT)
revolution has been sparked by recent advances in wireless technology, which have
caused an exponential increase in the number of connected objects. IoT devices collect,
analyse, and transmit massive volumes of data over the network.
IoT facilitates in connecting disparate elements found in heterogeneous environments.
IoT devices may be vulnerable to a variety of assaults, including man-in-the-middle and
denial-of-service (DoS) attacks, due to their openness and absence of human interaction.
Any device can connect to the network that leads to unauthorized access, in addition. In
IoT networks, the security of the sent data is a crucial area of concern.
The Internet of Things (IoT) has limited power, bandwidth, and storage. It is necessary to
implement an effective security solution that does not consume more IoT's resources. To
guarantee the security of transmitted data across the IoT network, numerous encryption
techniques have been developed. We analysed the various challenges and security
requirements as well as the various lightweight cryptographic algorithms and related
attacks.
Therefore, the primary objective of this research work is to maintain the trust of users in
the IoT by securing data from unauthorized reading and modification and preserving their
privacy. To achieve this, the entire research work is carried out to first, propose a new
lightweight cryptography technique to assure security of information with optimal use of
resources. Second, compare the proposed lightweight cryptography technique with the
existing algorithm in terms of their key size, key distribution mechanism, execution time
and memory requirements. Third, validate the proposed lightweight cryptography
technique against cryptanalysis attacks and evaluate performance in terms of
throughput and avalanche effect.
In the present study, researchers proposed a lightweight cryptography technique (LCT
01