Nguyen Van Tanh, Ngo Quang Tri, MSc, Nguyen Linh Giang, Nguyen Anh Tuan, Nguyen Van Ngo

Main Article Content

Abstract

With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System. It also includes the simulated experiments, solutions evaluation, conclusion, and future development.


Keywords:


Internet of Things (IoTs), Wireless Sensor Network (WSN), CurveCP, cryptographic box


References


[1] J. Bernstein, CurveCP: Usable Security for the Internet, University of Illinois at Chicago, January 22, 2017.


[2] V. Tanh, N. Q. Tri, N. L. Giang, N. A. Tuan, Design of Comprehensive Security Solution on Internet of Things with Improved DTLS Protocol and Overhearing Mechanism, Fundamental and Applied Information Technology Research (FAIR), Nha Trang, Vietnam, 2020.


[3] X. Li, W. He, S. Li, Internet of Things in Industries: A Survey, IEEE Transactions on Industrial Informatics, Vol. 10, No. 4, 2014, pp. 2233-2243.


[4] Hankerson, A. J. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Publishing, 2003.


[5] Pauly, C. Perkins, K. Rose, C. Wood, A Survey of Transport Security Protocols, University of Glasgow, September 6, 2018.


[6] Dunkels, Contiki: Bringing IP to Sensor Networks, ERCIM News Journal, European Union, 2009.


[7] Pedro, Mugdhe, Samarth, Cooja Simulator - Contiki Tutorials, Autonomous Networks Research Group, University of South California, 2016.


[8] Abdellatif, Contiki Developer, Power Consumption, July 17, 2017.


[9] Culler, D. Estrin, M. Srivastava, Guest Editors’ Introduction: Overview of Sensor Networks, 2004, pp. 41-49,


https://doi.org/10.1109/mc.2004.93.


[10] C. Mansfield, J.L. Antonakos, Computer Networking from LANs to WANs: Hardware, Software, and Security, Boston Cengage Learning, 2010, pp. 501.


[11] SAS Team, What is Network Latency (and How Do You Use a Latency Calculator to Calculate Throughput)?, The SAS Group of Companies Limited, April, 2019.


[12] Johnson, M. Healy, P. V.D. Ven, J. H. Martin, J. Nelson, T. Newe, E. Lewis, A Comparative Review of Wireless Sensor Network Mote Technologies, IEEE SENSORS Conference, 2009, pp. 1439-1442.


[13] D Hofstrand, Energy Measurements and Conversions, Iowa State University Extension and Outreach, 2007.


[14]Mojzís, tinyssh, The SSH Library, 2018.


[15] J. Bernstein, T. Lange, P. Schwabe, NaCl: Networking and Cryptography library, University of Illinois at Chicago, 2016.


[16] Felker, Musl 1.1.24 Reference Manual, License of Massachusetts Institute of Technology, 2011.


[17] V. Tanh, N. Q. Tri, N. G. Tuyen, T. Q. Duc, T. H. Anh, B. T. Tung, The Flooding Attack in Low Power and Lossy Networks: A Case Study, The 7 th IEEE International Conference on Smart Communications in Network Technologies (SaCoNet 2018), El Oued, Algeria, 2018.


[18]N. V. Tanh, N. Q. Tri, G. Tuyen, N. L. Giang, N. V. Tien, Design a Security System for Internet of Things with Detectinng and Author Proceedings of Eliminating Denial of Service Attack Based on Overhearing Mechanism, the 3rd Symposium of Information Security (SoIS 2018), Da Nang, Vietnam, 2018.


[19] S. Samonas, D. Coss, The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, Journal of Information System Security, Vol. 10, No. 3, 2014, pp. 21-45.