Abstract
Security is one of the primary concerns in an Internet of things (IoT) environment as they are deployed in critical applications that directly affect human lives. For this purpose, a security protocol that involves both authentication of deployed IoT devices and encryption of generated data is proposed in this paper. Encryption algorithms based on chaos are known to satisfy the basic requirements of the cryptosystem such as high sensitivity, high computational speed and high security. The chaos-based encryption algorithm is built upon a modified quadratic map named as quadratic sinusoidal map which exhibits better array of chaotic regime when compared to the traditional logistic map. The authentication protocol, on the other hand, is based on Merkle hash tree that has been improved to adapt to an IoT environment. The control parameters and the initial condition for the map are derived from the Merkle hash tree. The proposed algorithm involves cryptographic operations that incur very low computational cost and requires relatively little storage and at the same time are highly resilient to security attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Guo, B., Zhang, D., Yu, Z., Liang, Y., Wang, Z., Zhou, X.: From the internet of things to embedded intelligence. World Wide Web 16(4), 399–420 (2013)
Lampropoulos, K., Denazis, S.: Identity management directions in future internet. IEEE Commun. Mag. 49(12), 74–83 (2011)
Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: Mur-dpa: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2015)
Xu, K., Ma, X., Liu, C.: A hash tree based authentication scheme in sip applications. In: IEEE International Conference on Communications, ICC’08. IEEE (2008), pp. 1510–1514 (2008)
Niaz, M.S., Saake, G.: Merkle hash tree based techniques for data integrity of outsourced data.’ In: GvD, pp. 66–71 (2015)
Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, Y., Wu, J., Wu, W., Chilamkurti, N., Jeon, G.: An encryption algorithm based on combined chaos in body area networks (2017). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0045790617324138
Wang, X.-Y., Zhang, Y.-Q., Bao, X.-M.: A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6), 3877–3897 (2015)
Akhshani, A., Akhavan, A., Mobaraki, A., Lim, S.-C., Hassan, Z.: Pseudo random number generator based on quantum chaotic map. Commun. Nonlinear Sci. Numer. Simul. 19(1), 101–111 (2014)
Avaroğlu, E.: Pseudorandom number generator based on arnold cat map and statistical analysis. Turk. J. Electr. Eng. Comput. Sci. 25(1), 633–643 (2017)
Moreira, F.J.S.: Chaotic dynamics of quadratic maps. IMPA (1993)
Abundiz-Pérez, F., Cruz-Hernández, C., Murillo-Escobar, M., López-Gutiérrez, R., Arellano-Delgado, A.: A fingerprint image encryption scheme based on hyperchaotic rössler map. Math. Probl. Eng. 2016 (2016)
Murillo-Escobar, M., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.M.: Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 45, 297–309 (2016)
Méndez-Ramírez, R., Arellano-Delgado, A., Cruz-Hernández, C., Abundiz-Pérez, F., Martínez-Clark, R.: Chaotic digital cryptosystem using serial peripheral interface protocol and its dspic implementation. Front. Inf. Technol. Electron. Eng. 19(2), 165–179 (2018)
Hassan, W.H., et al.: Current research on internet of things (iot) security: a survey. Comput. Netw. 148, 283–294 (2018)
Hou, J., Qu, L., Shi, W.: A survey on internet of things security from data perspectives. Comput. Netw. 148, 295–306 (2018)
Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens J 13(10), 3693–3701 (2013)
Ning, H., Liu, H., Yang, L.: Cyber-entity security in the internet of things. Computer p. 1 (2013)
Cai, X., Wang, Y., Zhang, X., Luo, L.: Design and implementation of a wifi sensor device management system. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp. 10–14 (2014)
Gope, P., Hwang, T., et al.: Untraceable sensor movement in distributed iot infrastructure. IEEE Sens. J. 15(9), 5340–5348 (2015)
Gope, P., Hwang, T.: Bsn-care: A secure iot-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)
Loi, F., Sivanathan, A., Gharakheili, H.H., Radford, A., Sivaraman, V.: Systematically evaluating security and privacy for consumer iot devices. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM, pp. 1–6 (2017)
Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W.: Blockchain’s adoption in iot: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251–279 (2019). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804518303473
Mookherji, S., Sankaranarayanan, S.: Traffic data classification for security in iot-based road signaling system. In: Soft Computing in Data Analytics, pp. 589–599. Springer, Berlin (2019)
Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F., Baldini, G.: Risk-based automated assessment and testing for the cybersecurity certification and labelling of iot devices. Comput. Stand. Interfaces 62, 64–83 (2019)
Merkle, R.C.: A certified digital signature. In: Conference on the Theory and Application of Cryptology, pp. 218–238. Springer (1989)
Li, H., Lu, R., Zhou, L., Yang, B., Shen, X.: An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8(2), 655–663 (2014)
Lawande, Q., Ivan, B., Dhodapkar, S.: Chaos based cryptography: a new approach to secure communications. BARC newsletter, vol. 258, no. 258 (2005)
Acknowledgements
This work is partly supported by the Ministry of Electronics & Information Technology (MeitY), Government of India, under the Visvesvaraya PhD Scheme for Electronics & IT (PhD-PLA/4(71)/2015-16) and DST-Water Technology Initiative (WTI) (DST/TM/WTI/2k16/45(C)) dated 28 September 2016, Government of India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Nesa, N., Banerjee, I. (2020). A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 996. Springer, Singapore. https://doi.org/10.1007/978-981-13-8969-6_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-8969-6_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8968-9
Online ISBN: 978-981-13-8969-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)