Skip to main content

Security Solution for the Internet of Things with the Innovative Lightweight Encryption Algorithm CurveCP

  • Conference paper
  • First Online:
Advanced Computational Paradigms and Hybrid Intelligent Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1373))

Abstract

With the development of information technology, Internet of things (IoT) has been applied widely in human civilization, but it leads to the increase of the risk about information security. The traditional security solutions have revealed the lack of compatibility with IoT because of the differences about complex communication protocol, low energy, processing ability, and limited memory. Therefore, the suitable IoT security solutions need the balance between energy and costs as well as wide adaption for the various network protocols. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, recognized that the lightweight cryptography is the most optimal solution in new network platform generation. Our team also improved and implemented CurveCP which is one of these lightweight cryptographies in the wireless sensor networks (WSN) to enhance data secure and information security of IoT system. This study briefly describes the improvement of CurveCP lightweight cryptography by reducing length of cryptographic key as well as implement in IoT system. It also includes the simulation experiment, solutions evaluation, conclusion, and future development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bernstein, D.J.: CurveCP: Usable Security for the Internet. University of Illinois, Chicago, 22 Jan 2017

    Google Scholar 

  2. Van Tanh, N. Tri, N.Q., Giang, N.L., Tuan, N.A.: Design of comprehensive security solution on Internet of Things with improved DTLS protocol and overhearing mechanism. In: Fundamental and Applied Information Technology Research (FAIR), Nha Trang, Vietnam (2020)

    Google Scholar 

  3. Li, D.X., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014)

    Google Scholar 

  4. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Publishing (2003)

    Google Scholar 

  5. Pauly, T., Perkins, C., Rose, K., Wood, C.: A Survey of Transport Security Protocols. University of Glasgow, 6 Sept 2018

    Google Scholar 

  6. Dunkels, A.: Contiki: bringing IP to sensor networks. ERCIM News J. Eur. Union (2009)

    Google Scholar 

  7. Pedro, Mugdhe, Samarth: Cooja simulator—Contiki tutorials. In: Autonomous Networks Research Group. University of South California (2016)

    Google Scholar 

  8. Mojzís, J.: Tinyssh. The SSH Library (2018)

    Google Scholar 

  9. Bernstein, D.J., Lange, T., Schwabe, P.: NaCl: Networking and Cryptography Library. University of Illinois, Chicago (2016)

    Google Scholar 

  10. Felker, R.: Musl 1.1.24 reference manual. License of Massachusetts Institute of Technology (2011)

    Google Scholar 

  11. Culler D., Estrin D., Srivastava M.: Guest Editors’ Introduction: Overview of Sensor Networks, pp. 41–49 (2004). https://doi.org/10.1109/mc.2004.93

  12. Mansfield, K.C., Antonakos, J.L.: Computer Networking from LANs to WANs: Hardware, Software, and Security. Boston Cengage Learning, p. 501 (2010)

    Google Scholar 

  13. SAS Team: What is network latency (and how do you use a latency calculator to calculate throughput)? The SAS Group of Companies Limited, Apr 2019

    Google Scholar 

  14. Abdellatif, M.: [Contiki Developer] Power Consumption, 17 July 2017

    Google Scholar 

  15. Johnson, M., Healy, M., van de Ven, P., Hayes, M.J., Nelson, J., Newe, T., Lewis, E.: A comparative review of wireless sensor network mote technologies. In: IEEE Sensors Conference, p. 1442 (2009)

    Google Scholar 

  16. Hofstrand, D.: Energy Measurements and Conversions. Iowa State University Extension and Outreach (2007)

    Google Scholar 

  17. Van Tanh, N., Tri, N.Q., Tuyen, N.G., Duc, T.Q., Anh, T.H., Tung, B.T.: The flooding attack in low power and lossy networks: a case study. In: The 7 th IEEE International Conference on Smart Communications in Network Technologies (SaCoNet 2018). El Oued, Algeria (2018)

    Google Scholar 

  18. Văn Tánh, N., Trí, N.Q., , N.G., Giang, N.L., , N.V.: Design a security system for internet of things with detecting and author proceedings of eliminating denial of service attack based on overhearing mechanism. In: The 3rd Symposium of Information Security (SoIS 2018). Da Nang, Vietnam (2018)

    Google Scholar 

  19. Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3), 21–45 (2014)

    Google Scholar 

Download references

Acknowledgements

Our team sends the gratefulness to tutors and the colleagues for providing adequate support about infrastructure and advice during the researching process. They work in Bach Khoa Cipher Security Center and other faculties in School of Information Communication Technology, Hanoi University of Science and Technology as well as Vietnam National University. This research is funded by Hanoi Department of Science and Technology under the project 01C-02/01-2019-3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nguyen Van Tanh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Van Tanh, N., Tri, N.Q., Giang, N.L., Le, DT. (2022). Security Solution for the Internet of Things with the Innovative Lightweight Encryption Algorithm CurveCP. In: Gandhi, T.K., Konar, D., Sen, B., Sharma, K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing . Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_49

Download citation

Publish with us

Policies and ethics