Skip to main content

Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents

  • Conference paper
  • First Online:
Proceedings of the 9th International Conference on Computational Science and Technology (ICCST 2022)

Abstract

This study designs a secret Key using an Algebraic Procedure (KAP). KAP has the capability to act in a different manner dependent on the plaintext input. Two different secret key length approaches are presented in this work. Increase the unpredictability and privacy of plaintext by using such a scheme is the main objective of this design presented in this paper. A sequence of algebraic procedures has been utilized in order to construct a particular coefficient by which the link between plaintext size and key length is customizable. This design of secret key enhances the privacy of sensitive data notably utilized with smart Internet-of-Things (IoT) based applications. Calculations on how long it takes to produce and encrypt a single secret key have shown that the suggested architecture is efficient. Additionally, the findings have demonstrated that when a directly proportional connection between user entries to size-in-bits, the relationship between user entries and secret key algebraic functions is reversely proportional thus higher unpredictability of plaintext and secret key may be attained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu Z, Choo KKR, Grossschadl J (2018) Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun Mag 56(2):158–162. https://doi.org/10.1109/MCOM.2018.1700330

    Article  Google Scholar 

  2. Neisse R, Baldini G, Steri G, Ahmad A, Fourneret E, Legeard B (2017) Improving internet of things device certification with policy-based management. In: 2017 global internet of things summit (GIoTS), 6–9 June 2017, pp 1–6. https://doi.org/10.1109/GIOTS.2017.8016273

  3. Rane S, Dubey A, Parida T (2017) Design of IoT based intelligent parking system using image processing algorithms. In: 2017 international conference on computing methodologies and communication (ICCMC), pp 1049–1053. https://doi.org/10.1109/ICCMC.2017.8282631

  4. Xiao-Long W, Chun-Fu W, Guo-Dong L, Qing-Xie C (2017) A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese automation congress (CAC), 20–22 Oct 2017, pp 7837–7840. https://doi.org/10.1109/CAC.2017.8244199

  5. Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469. https://doi.org/10.1109/TVT.2017.2703631

    Article  Google Scholar 

  6. Kirkham T, Armstrong D, Djemame K, Jiang M (2014) Risk driven smart home resource management using cloud services. Future Gener Comput Syst 38:13–22. https://doi.org/10.1016/j.future.2013.08.006

    Article  Google Scholar 

  7. Chen YH, Tsai MJ, Fu LC, Chen CH, Wu CL, Zeng YC (2015) Monitoring elder’s living activity using ambient and body sensor network in smart home. In: 2015 IEEE international conference on systems, man, and cybernetics, pp 2962–2967. https://doi.org/10.1109/SMC.2015.515

  8. Zhang Y (2018) Test and verification of AES used for image encryption. 3D Res 9(1):1–27

    Google Scholar 

  9. Thammarat C, Kurutach W (2019) A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. Int J Commun Syst 32(12):e3991

    Article  Google Scholar 

  10. Thammarat C, Kurutach W (2018) A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification. Wireless Commun Mob Comput 2018

    Google Scholar 

  11. Wu D, Gan Q, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453

    Article  Google Scholar 

  12. Chen L, Chen Z (2019) Practical, dynamic and efficient integrity verification for symmetric searchable encryption. In: International conference on cryptology and network security. Springer, pp 163–183

    Google Scholar 

  13. Zhen L, Ma K (2021) Encryption and verification scheme of source IPv6 address between internet domains. In: 2021 2nd international conference on computer communication and network security (CCNS). IEEE, pp 126–133

    Google Scholar 

  14. Zhang J, Shen C, Su H, Arafin MT, Qu G (2021) Voltage over-scaling-based lightweight authentication for IoT security. IEEE Trans Comput 71(2):323–336

    Article  MATH  Google Scholar 

  15. Badhib A, Alshehri S, Cherif A (2021) A robust device-to-device continuous authentication protocol for the internet of things. IEEE Access 9:124768–124792

    Article  Google Scholar 

  16. Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) PUF-based authentication and key agreement protocols for IoT, WSNs and smart grids: a comprehensive survey. IEEE Internet Things J

    Google Scholar 

  17. Deebak B et al (2022) Lightweight blockchain based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet Things J

    Google Scholar 

  18. Chen B, Willems FMJ (2019) Secret key generation over biased physical unclonable functions with polar codes. IEEE Internet Things J 6(1):435–445. https://doi.org/10.1109/JIOT.2018.2864594

    Article  Google Scholar 

  19. Khan AR et al (2022) DSRC technology in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) IoT system for intelligent transportation system (ITS): a review. In: Recent trends in mechatronics towards industry 4.0, pp 97–106

    Google Scholar 

  20. Mun H, Seo M, Lee DH (2021) Secure privacy-preserving V2V communication in 5G-V2X supporting network slicing. IEEE Trans Intell Transp Syst

    Google Scholar 

  21. Bottarelli M, Karadimas P, Epiphaniou G, Ismail DKB, Maple C (2021) Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Trans Veh Technol 70(3):2310–2321. https://doi.org/10.1109/TVT.2021.3056638

    Article  Google Scholar 

  22. Thai CDT, Lee J, Prakash J, Quek TQS (2019) Secret group-key generation at physical layer for multi-antenna mesh topology. IEEE Trans Inf Forensics Secur 14(1):18–33. https://doi.org/10.1109/TIFS.2018.2837661

    Article  Google Scholar 

  23. Zhang S, Jin L, Lou Y, Zhong Z (2018) Secret key generation based on two-way randomness for TDD-SISO system. China Commun 15(7):202–216. https://doi.org/10.1109/CC.2018.8424614

    Article  Google Scholar 

  24. Peechara RR, Sucharita V (2021) A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing. PeerJ Comput Sci 7:e628

    Article  Google Scholar 

  25. Jin L, Zhang S, Lou Y, Xu X, Zhong Z (2019) Secret key generation with cross multiplication of two-way random signals. IEEE Access 7:113065–113080

    Article  Google Scholar 

  26. Mao Y, Zeng P, Chen TY (2021) Recent advances on quantum key distribution overcoming the linear secret key capacity bound. Adv Quant Technol 4(1):2000084

    Article  Google Scholar 

  27. Wang H, Zhao Y, Tornatore M, Yu X, Zhang J (2021) Dynamic secret-key provisioning in quantum-secured passive optical networks (PONs). Opt Express 29(2):1578–1596

    Article  Google Scholar 

  28. Liao Q, Liu H, Zhu L, Guo Y (2021) Quantum secret sharing using discretely modulated coherent states. Phys Rev A 103(3):032410

    Article  MathSciNet  Google Scholar 

  29. He X et al (2022) Routing and secret key assignment for secure multicast services in quantum satellite networks. J Opt Commun Netw 14(4):190–203. https://doi.org/10.1364/JOCN.445621

    Article  Google Scholar 

  30. Huang Y, Jin L, Wei H, Zhong Z, Zhang S (2018) Fast secret key generation based on dynamic private pilot from static wireless channels. China Commun 15(11):171–183. https://doi.org/10.1109/CC.2018.8543098

    Article  Google Scholar 

  31. Hayashi M, Vázquez-Castro Á (2020) Physical layer security protocol for Poisson channels for passive man-in-the-middle attack. IEEE Trans Inf Forensics Secur 15:2295–2305

    Article  Google Scholar 

  32. Devi OR, Vallabhaneni SP, Hussain MA, Kumar TK (2020) Security analysis on remote authentication against man-in-the-middle attack on secure socket layer. IOP Conf Ser Mater Sci Eng 981(2):022015. IOP Publishing

    Google Scholar 

  33. Stepień K, Poniszewska-Marańda A (2019) Security measures in the vehicular ad-hoc networks—man in the middle attack. In: International conference on mobile web and intelligent information systems. Springer, pp 136–147

    Google Scholar 

  34. Al-Shareeda MA, Anbar M, Manickam S, Hasbullah IH (2020) Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. Int J Eng Manage Res 10

    Google Scholar 

  35. Lu X, Lei J, Shi Y, Li W (2021) Intelligent reflecting surface assisted secret key generation. IEEE Signal Process Lett 28:1036–1040

    Article  Google Scholar 

  36. Jagadeesh H, Joshi R, Rao M (2021) Group secret-key generation using algebraic rings in wireless networks. IEEE Trans Veh Technol 70(2):1538–1553

    Article  Google Scholar 

  37. You J, Wang YG, Zhu G, Wu L, Zhang H, Kwong S (2022) Estimating the secret key of spread spectrum watermarking based on equivalent keys. IEEE Trans Multimed 1. https://doi.org/10.1109/TMM.2022.3147379

  38. Zhang Y, Zhao H, Xiang Y, Huang X, Chen X (2019) A key agreement scheme for smart homes using the secret mismatch problem. IEEE Internet Things J 6(6):10251–10260. https://doi.org/10.1109/JIOT.2019.2936884

    Article  Google Scholar 

  39. Mishra P, Kumar S, Garg U, Pilli ES, Joshi R (2021) Security perspectives of various IoT cloud platforms: a review & case study. In: 2021 international conference on computing, communication, and intelligent systems (ICCCIS). IEEE, pp 727–731

    Google Scholar 

  40. Peng L, Li G, Zhang J, Woods R, Liu M, Hu A (2019) An investigation of using loop-back mechanism for channel reciprocity enhancement in secret key generation. IEEE Trans Mob Comput 18(3):507–519. https://doi.org/10.1109/TMC.2018.2842215

  41. Pandey F, Dash P, Samanta D, Sarma M (2022) Efficient and provably secure intelligent geometrical method of secret key generation for cryptographic applications. Comput Electr Eng 101:107947. https://doi.org/10.1016/j.compeleceng.2022.107947

Download references

Acknowledgements

This work has been fully funded by Universiti Tenaga Nasional (UNITEN). Grant Codes are: (J510050002/2021048) and (J510050002/2021156). This research is also supported by the TNB SEED FUND (Code: U-TL-RD-21).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abbas M. Al-Ghaili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Ghaili, A.M. et al. (2023). Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents. In: Kang, DK., Alfred, R., Ismail, Z.I.B.A., Baharum, A., Thiruchelvam, V. (eds) Proceedings of the 9th International Conference on Computational Science and Technology. ICCST 2022. Lecture Notes in Electrical Engineering, vol 983. Springer, Singapore. https://doi.org/10.1007/978-981-19-8406-8_6

Download citation

Publish with us

Policies and ethics