{"title":"基于多态密码OTP的保护物联网设备端点的加密模型","authors":"C. Bran, Douglas Flores, Carlos Hernández","doi":"10.1109/CONCAPAN48024.2022.9997589","DOIUrl":null,"url":null,"abstract":"The security of data exchange between IoT components is of vital importance to avoid integrity breaches in M2M relationships.The main reason for incorporating complex encryption strategies is the processing and memory limitations of embedded systems. This paper proposes an efficient alternative for encrypting messages between two IoT components with processes that make use of keys that change with each new communication making it difficult for brute force attacks to gain access to the exchanged content. Additionally, the method adds a mutation of the encryption functions that adds another additional difficulty to decrypt the message since it depends not only on the key but also on the sequence of application of the decryption functions. The algorithm can be scaled up to end nodes with larger resources, so that the number of bits of the keys and the complexity of the encryption functions can be further increased, and since it is applied directly on the payload, it is independent of any other security method used in higher layers.","PeriodicalId":138415,"journal":{"name":"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptography model to secure IoT device endpoints, based on polymorphic cipher OTP\",\"authors\":\"C. Bran, Douglas Flores, Carlos Hernández\",\"doi\":\"10.1109/CONCAPAN48024.2022.9997589\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of data exchange between IoT components is of vital importance to avoid integrity breaches in M2M relationships.The main reason for incorporating complex encryption strategies is the processing and memory limitations of embedded systems. This paper proposes an efficient alternative for encrypting messages between two IoT components with processes that make use of keys that change with each new communication making it difficult for brute force attacks to gain access to the exchanged content. Additionally, the method adds a mutation of the encryption functions that adds another additional difficulty to decrypt the message since it depends not only on the key but also on the sequence of application of the decryption functions. The algorithm can be scaled up to end nodes with larger resources, so that the number of bits of the keys and the complexity of the encryption functions can be further increased, and since it is applied directly on the payload, it is independent of any other security method used in higher layers.\",\"PeriodicalId\":138415,\"journal\":{\"name\":\"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONCAPAN48024.2022.9997589\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONCAPAN48024.2022.9997589","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptography model to secure IoT device endpoints, based on polymorphic cipher OTP
The security of data exchange between IoT components is of vital importance to avoid integrity breaches in M2M relationships.The main reason for incorporating complex encryption strategies is the processing and memory limitations of embedded systems. This paper proposes an efficient alternative for encrypting messages between two IoT components with processes that make use of keys that change with each new communication making it difficult for brute force attacks to gain access to the exchanged content. Additionally, the method adds a mutation of the encryption functions that adds another additional difficulty to decrypt the message since it depends not only on the key but also on the sequence of application of the decryption functions. The algorithm can be scaled up to end nodes with larger resources, so that the number of bits of the keys and the complexity of the encryption functions can be further increased, and since it is applied directly on the payload, it is independent of any other security method used in higher layers.