首页> 外文会议>Doctoral symposium on applied computation and security systems >Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
【24h】

Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT

机译:组合Merkle Hash树和混沌密码,用于IOT中的安全数据融合

获取原文

摘要

With the wide applicability of sensors in our daily lives, security has become one of the primary concerns in an Internet of Things (IoT) environment. Particularly, user's privacy and unauthorized access to sensitive information needs to be kept in mind while designing security algorithms. This paper puts forward a security protocol that integrates authentication of the deployed IoT devices and encryption of the generated data. We have modified the well-known Merkle Hash Tree to adapt to an IoT environment for authenticating the devices and utilized the concepts of Chaos theory for developing the encryption algorithm. The use of chaos in cryptography are known to satisfy the basic requirements of the cryptosystem such as, high sensitivity, high computational speed and high security. In addition, we have proposed a chaotic map named Quadratic Sinusoidal Map which exhibits better array of chaotic regime when compared to the traditional quadratic map. The security analysis demonstrate that the proposed protocol is simple having low computational requirements, has strong security capabilities and highly resilient to security attacks.
机译:随着传感器在日常生活中的广泛适用性,安全已成为事物互联网(物联网)环境中的主要问题之一。特别是,在设计安全算法时,需要在设计安全算法的同时牢记用户的隐私和未经授权的访问权限。本文提出了一种安全协议,它集成了部署的物联网设备的身份验证和生成数据的加密。我们修改了众所周知的Merkle哈希树,以适应IOT环境,用于验证设备,并利用混沌理论的概念来开发加密算法。已知使用混沌在密码术中满足密码系统的基本要求,如高灵敏度,高计算速度和高安全性。此外,我们提出了一个名为二次正弦图的混沌图,该地图与传统的二次图相比表现出更好的混沌制度。安全性分析表明,拟议的协议很简单,具有低计算要求,具有强大的安全功能和高度适应安全攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号