Abstract
This study designs a secret Key using an Algebraic Procedure (KAP). KAP has the capability to act in a different manner dependent on the plaintext input. Two different secret key length approaches are presented in this work. Increase the unpredictability and privacy of plaintext by using such a scheme is the main objective of this design presented in this paper. A sequence of algebraic procedures has been utilized in order to construct a particular coefficient by which the link between plaintext size and key length is customizable. This design of secret key enhances the privacy of sensitive data notably utilized with smart Internet-of-Things (IoT) based applications. Calculations on how long it takes to produce and encrypt a single secret key have shown that the suggested architecture is efficient. Additionally, the findings have demonstrated that when a directly proportional connection between user entries to size-in-bits, the relationship between user entries and secret key algebraic functions is reversely proportional thus higher unpredictability of plaintext and secret key may be attained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu Z, Choo KKR, Grossschadl J (2018) Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun Mag 56(2):158–162. https://doi.org/10.1109/MCOM.2018.1700330
Neisse R, Baldini G, Steri G, Ahmad A, Fourneret E, Legeard B (2017) Improving internet of things device certification with policy-based management. In: 2017 global internet of things summit (GIoTS), 6–9 June 2017, pp 1–6. https://doi.org/10.1109/GIOTS.2017.8016273
Rane S, Dubey A, Parida T (2017) Design of IoT based intelligent parking system using image processing algorithms. In: 2017 international conference on computing methodologies and communication (ICCMC), pp 1049–1053. https://doi.org/10.1109/ICCMC.2017.8282631
Xiao-Long W, Chun-Fu W, Guo-Dong L, Qing-Xie C (2017) A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese automation congress (CAC), 20–22 Oct 2017, pp 7837–7840. https://doi.org/10.1109/CAC.2017.8244199
Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469. https://doi.org/10.1109/TVT.2017.2703631
Kirkham T, Armstrong D, Djemame K, Jiang M (2014) Risk driven smart home resource management using cloud services. Future Gener Comput Syst 38:13–22. https://doi.org/10.1016/j.future.2013.08.006
Chen YH, Tsai MJ, Fu LC, Chen CH, Wu CL, Zeng YC (2015) Monitoring elder’s living activity using ambient and body sensor network in smart home. In: 2015 IEEE international conference on systems, man, and cybernetics, pp 2962–2967. https://doi.org/10.1109/SMC.2015.515
Zhang Y (2018) Test and verification of AES used for image encryption. 3D Res 9(1):1–27
Thammarat C, Kurutach W (2019) A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. Int J Commun Syst 32(12):e3991
Thammarat C, Kurutach W (2018) A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification. Wireless Commun Mob Comput 2018
Wu D, Gan Q, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453
Chen L, Chen Z (2019) Practical, dynamic and efficient integrity verification for symmetric searchable encryption. In: International conference on cryptology and network security. Springer, pp 163–183
Zhen L, Ma K (2021) Encryption and verification scheme of source IPv6 address between internet domains. In: 2021 2nd international conference on computer communication and network security (CCNS). IEEE, pp 126–133
Zhang J, Shen C, Su H, Arafin MT, Qu G (2021) Voltage over-scaling-based lightweight authentication for IoT security. IEEE Trans Comput 71(2):323–336
Badhib A, Alshehri S, Cherif A (2021) A robust device-to-device continuous authentication protocol for the internet of things. IEEE Access 9:124768–124792
Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) PUF-based authentication and key agreement protocols for IoT, WSNs and smart grids: a comprehensive survey. IEEE Internet Things J
Deebak B et al (2022) Lightweight blockchain based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet Things J
Chen B, Willems FMJ (2019) Secret key generation over biased physical unclonable functions with polar codes. IEEE Internet Things J 6(1):435–445. https://doi.org/10.1109/JIOT.2018.2864594
Khan AR et al (2022) DSRC technology in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) IoT system for intelligent transportation system (ITS): a review. In: Recent trends in mechatronics towards industry 4.0, pp 97–106
Mun H, Seo M, Lee DH (2021) Secure privacy-preserving V2V communication in 5G-V2X supporting network slicing. IEEE Trans Intell Transp Syst
Bottarelli M, Karadimas P, Epiphaniou G, Ismail DKB, Maple C (2021) Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Trans Veh Technol 70(3):2310–2321. https://doi.org/10.1109/TVT.2021.3056638
Thai CDT, Lee J, Prakash J, Quek TQS (2019) Secret group-key generation at physical layer for multi-antenna mesh topology. IEEE Trans Inf Forensics Secur 14(1):18–33. https://doi.org/10.1109/TIFS.2018.2837661
Zhang S, Jin L, Lou Y, Zhong Z (2018) Secret key generation based on two-way randomness for TDD-SISO system. China Commun 15(7):202–216. https://doi.org/10.1109/CC.2018.8424614
Peechara RR, Sucharita V (2021) A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing. PeerJ Comput Sci 7:e628
Jin L, Zhang S, Lou Y, Xu X, Zhong Z (2019) Secret key generation with cross multiplication of two-way random signals. IEEE Access 7:113065–113080
Mao Y, Zeng P, Chen TY (2021) Recent advances on quantum key distribution overcoming the linear secret key capacity bound. Adv Quant Technol 4(1):2000084
Wang H, Zhao Y, Tornatore M, Yu X, Zhang J (2021) Dynamic secret-key provisioning in quantum-secured passive optical networks (PONs). Opt Express 29(2):1578–1596
Liao Q, Liu H, Zhu L, Guo Y (2021) Quantum secret sharing using discretely modulated coherent states. Phys Rev A 103(3):032410
He X et al (2022) Routing and secret key assignment for secure multicast services in quantum satellite networks. J Opt Commun Netw 14(4):190–203. https://doi.org/10.1364/JOCN.445621
Huang Y, Jin L, Wei H, Zhong Z, Zhang S (2018) Fast secret key generation based on dynamic private pilot from static wireless channels. China Commun 15(11):171–183. https://doi.org/10.1109/CC.2018.8543098
Hayashi M, Vázquez-Castro Á (2020) Physical layer security protocol for Poisson channels for passive man-in-the-middle attack. IEEE Trans Inf Forensics Secur 15:2295–2305
Devi OR, Vallabhaneni SP, Hussain MA, Kumar TK (2020) Security analysis on remote authentication against man-in-the-middle attack on secure socket layer. IOP Conf Ser Mater Sci Eng 981(2):022015. IOP Publishing
Stepień K, Poniszewska-Marańda A (2019) Security measures in the vehicular ad-hoc networks—man in the middle attack. In: International conference on mobile web and intelligent information systems. Springer, pp 136–147
Al-Shareeda MA, Anbar M, Manickam S, Hasbullah IH (2020) Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. Int J Eng Manage Res 10
Lu X, Lei J, Shi Y, Li W (2021) Intelligent reflecting surface assisted secret key generation. IEEE Signal Process Lett 28:1036–1040
Jagadeesh H, Joshi R, Rao M (2021) Group secret-key generation using algebraic rings in wireless networks. IEEE Trans Veh Technol 70(2):1538–1553
You J, Wang YG, Zhu G, Wu L, Zhang H, Kwong S (2022) Estimating the secret key of spread spectrum watermarking based on equivalent keys. IEEE Trans Multimed 1. https://doi.org/10.1109/TMM.2022.3147379
Zhang Y, Zhao H, Xiang Y, Huang X, Chen X (2019) A key agreement scheme for smart homes using the secret mismatch problem. IEEE Internet Things J 6(6):10251–10260. https://doi.org/10.1109/JIOT.2019.2936884
Mishra P, Kumar S, Garg U, Pilli ES, Joshi R (2021) Security perspectives of various IoT cloud platforms: a review & case study. In: 2021 international conference on computing, communication, and intelligent systems (ICCCIS). IEEE, pp 727–731
Peng L, Li G, Zhang J, Woods R, Liu M, Hu A (2019) An investigation of using loop-back mechanism for channel reciprocity enhancement in secret key generation. IEEE Trans Mob Comput 18(3):507–519. https://doi.org/10.1109/TMC.2018.2842215
Pandey F, Dash P, Samanta D, Sarma M (2022) Efficient and provably secure intelligent geometrical method of secret key generation for cryptographic applications. Comput Electr Eng 101:107947. https://doi.org/10.1016/j.compeleceng.2022.107947
Acknowledgements
This work has been fully funded by Universiti Tenaga Nasional (UNITEN). Grant Codes are: (J510050002/2021048) and (J510050002/2021156). This research is also supported by the TNB SEED FUND (Code: U-TL-RD-21).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Al-Ghaili, A.M. et al. (2023). Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents. In: Kang, DK., Alfred, R., Ismail, Z.I.B.A., Baharum, A., Thiruchelvam, V. (eds) Proceedings of the 9th International Conference on Computational Science and Technology. ICCST 2022. Lecture Notes in Electrical Engineering, vol 983. Springer, Singapore. https://doi.org/10.1007/978-981-19-8406-8_6
Download citation
DOI: https://doi.org/10.1007/978-981-19-8406-8_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8405-1
Online ISBN: 978-981-19-8406-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)