Journal
ACM TRANSACTIONS ON INTERNET OF THINGS
Volume 4, Issue 2, Pages -Publisher
ASSOC COMPUTING MACHINERY
DOI: 10.1145/3586578
Keywords
Rubik's Cube Cryptosystem; mutual authentication; Internet of Things; secret session keys; session key randomizer; Blockchain; token (zvma); Cyber-security; IoT security; data privacy; chaotic maps; image encryption-decryption; number theory; RCC-Block-MASSK model; light-weight
Ask authors/readers for more resources
Over the past decade, IoT has made significant progress in terms of technology exploration, integration, and various applications despite its resource-bound architecture. The challenge lies in running high-end security protocols on Edge devices, which are highly vulnerable to cyber-attacks. To address this, proper mutual authentication and session key establishment are crucial, and a Rubik's cube puzzle-based cryptosystem is proposed in this article for parameter exchange. Incorporating blockchain technology ensures anonymity of token transactions, and a session key pool randomizer is used to prevent probabilistic attacks. The hybrid model generates secure session keys for mutual authentication and reliable data transferring tasks, exhibiting promising results in terms of efficiency, light weightiness, and practical applications.
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any highend security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available