S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran
{"title":"用于高效物联网 D2d 通信的晶体凯博加密算法","authors":"S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran","doi":"10.1007/s11276-024-03790-6","DOIUrl":null,"url":null,"abstract":"<p>Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"40 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Crystals kyber cryptographic algorithm for efficient IoT D2d communication\",\"authors\":\"S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran\",\"doi\":\"10.1007/s11276-024-03790-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.</p>\",\"PeriodicalId\":23750,\"journal\":{\"name\":\"Wireless Networks\",\"volume\":\"40 1\",\"pages\":\"\"},\"PeriodicalIF\":2.1000,\"publicationDate\":\"2024-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11276-024-03790-6\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03790-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Crystals kyber cryptographic algorithm for efficient IoT D2d communication
Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.
期刊介绍:
The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.
Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.