مقاله انگلیسی رایگان در مورد سیستم رمزنگاری برای برنامه های کاربردی داده ها، در زمینه اینترنت اشیا – الزویر 2020

 

مشخصات مقاله
ترجمه عنوان مقاله سیستم رمزنگاری برای برنامه های کاربردی داده ها، در زمینه اینترنت اشیا
عنوان انگلیسی مقاله Cryptographic system for data applications, in the context of internet of things
انتشار مقاله سال 2020
تعداد صفحات مقاله انگلیسی 12 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
1.434 در سال 2019
شاخص H_index 33 در سال 2020
شاخص SJR 0.264 در سال 2019
شناسه ISSN 0141-9331
شاخص Quartile (چارک) Q3 در سال 2019
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط کامپیوتر، فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده، امنیت اطلاعات، مهندسی نرم افزار، مهندسی الگوریتم ها و محاسبات، مدیریت سیستم های اطلاعات، معماری سازمانی
نوع ارائه مقاله
ژورنال
مجله  ریزپردازنده ها و میکروسیستم ها – Microprocessors And Microsystems
دانشگاه Delft University of Technology (TU Delft), Netherlands
کلمات کلیدی اینترنت اشیا (IoT)، استاندارد رمزنگاری پیشرفته، UDOO Neo board ،GCM ،GMAC، رمز یک بار مصرف (OTP)، احراز هویت دو مرحله ای، سیستم امنیتی
کلمات کلیدی انگلیسی Internet of things (IoT)، AES، GMAC، GCM، UDOO Neo board، One time passwords (OTP)، Two factor authentication، Security system
شناسه دیجیتال – doi
https://doi.org/10.1016/j.micpro.2019.102921
کد محصول E14364
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

1- Introduction

2- Internet of things technology: towards to a new era

3- Privacy and cryptography primitives

4- Security level and implementation devices

5- Selected IoT board 6. Proposed cryptographic system

7- Proposed IoT system implementation

8- Implementations results and comparisons

9- Conclusions & outlook

References

بخشی از متن مقاله:

Abstract

With each passing day, Internet of Things (IoT), has the potential to transform our society to a more digital way. In this paper, a cryptographic system is proposed, which has been designed and implemented, following the IoT optimized technologies. As the benefits of IoT are numerous, the need for a privacy platform is more than necessary to be developed. This work aims to demonstrate this by, firstly, implementing efficient and flexible, the fundamentals primitives of cryptography and privacy. Secondly, this is achieved, by introducing applied cryptography, in a more interactive and flexible approach. The proposed system and the incorporation of this platform is scrutinized. In the context of this work, an application of symmetric cryptography is introduced, based on the Advanced Encryption Standard (AES) in Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Counter (CTR) modes of operation, for both encryption and decryption of texts, images and electronic data applications. In addition two other security schemes are supported by the proposed system: AES Galois/Counter Mode (GCM) and AES Galois Message Authentication Code (GMAC). The GCM proposed integration, in an authentication scheme, designed to provide authenticity and confidentiality, at the same time. On the other hand, GMAC, can be applied as message authentication code. Both operations, are optimized in sense of implementation resources, since the major cost is targeted to AES core. In addition, based on the integrated hardware modules, user registration and validation is proposed and implemented, with no additional cost, and with no performance penalty. Furthermore, two factor authentication has been designed and proposed, based on One Time Passwords (OTP), which can been produced with a random procedure. After these, a reference to the security levels, as regards to the communication between the IoT layers of the architecture, is presented. IoT hardware platforms are facing lack of security level and this brings the opportunity to use advanced security mechanisms. Implementation comparison results emphasize the importance of testing and measuring the performance of the alternative encryption algorithms, supported by hardware platforms.

Introduction

Nowadays, the development of Internet is being shaped mostly by instant data exchange. The pattern of device usage in an extensive and exhaustive way, is giving ability to the users, in order to communicate and share information. For this reason, the need for protecting the devices and the information dissemination among them, is determined as mandatory. Internet of Things (IoT), can be described as an application domain that integrates different technological and social fields [1]. Furthermore, IoT can bring together cryptographic models and security schemes, for implementation purposes, as described in [2]. For example, IoT systems can be based on AES, ECB and CBC modes of operation for symmetric encryption. Other algorithms such as RSA, SHA standards DiffieHellman and Elliptic Curve Cryptography (ECC), can serve as supplemented privacy schemes, for asymmetric cryptography. Embedded systems design, are usually based on microprocessors, and microcontrollers. The role of embedded systems is to perform specific tasks such as sampling sensors and provide cost effectiveness and high portability, due to their small sizes. It is worthwhile mentioning, that these devices are discretized in how they interpret data. Moreover, they can be utilized for different applications as they are able to be programmable, flexible and can further be applicable to IoT environments.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا