Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes

Kester Quist-Aphetsi, Michael Christopher Xenya
{"title":"Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00022","DOIUrl":null,"url":null,"abstract":"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"47 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用Diffie-Hellman、AES和MD5加密方案实现物联网设备节点到节点的安全数据通信
识别正确的物联网源节点和目标节点以及安全的数据通信对于确保物联网通信的安全性、有效性和可靠性至关重要。由于越来越多的设备被编程为在物联网和无线传感器网络中自主交换数据和命令,因此传输数据的安全性和真实性非常重要。这需要强有力的安全方法来防止被动和主动攻击者对数据通信的攻击。本文提出了一种物联网设备间通信安全方案,采用Diffie-Hellman加密算法对通信节点进行认证,同时使用AES和MD5对节点间数据传输进行加密验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network [Title page iii] Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256 Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1