Skip to main content

Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol

  • Conference paper
  • First Online:
Information and Software Technologies (ICIST 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1665))

Included in the following conference series:

  • 443 Accesses

Abstract

The Internet of Things (IoT) has combined the hardware components with software elements by providing users with remote control and management facilities. From safety-critical systems to security devices and industrial appliances, every appliance makes use of IoTs. Whereas security issues such as SQL injections, Denial of Service/Distributed Denial of Service (DOS/DDOS) attacks, the forged transmission of messages, or man in the middle (MITM) are major security threats among smart devices. Any purging of data causes privacy issues while the subsequent assessments made using modified information are also erroneous. This security hole needs comprehensive non-cryptographic data-security techniques and frameworks which would help developers in creating secure systems on heterogeneous devices. Algorithms like blowfish and Data Encryption Standard (DES) do not have the uniquity which AES does, making them more vulnerable to attack this research paper focuses on the communication security issues in IoT systems. We have proposed an End-to-End Encryption using AES in IoT (EAES-IoT). Validation of the proposed algorithm has been done in a case study of the Smart Voice Pathology Monitoring System (SVPMS) by sending the encoded data to the application layer through Application Programming Interface (API). We compared results to ensure the authenticity of the data and they were found promising. Data access is provided only to authorized individuals by providing a shared key for decryption of the alphanumeric string of data shared between devices. The proposed algorithm will provide future directions to meet security challenges in the IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chze, P.L.R., Leong, K.S.: A secure multi-hop routing for IoT communication. In Proceedings of IEEE World Forum of Internet of Things (WF-IoT), USA, pp. 428–432 (2014)

    Google Scholar 

  2. Hameed, S., Idrees, K.F., Hameed, B.: Understanding security requirements and challenges in Internet of Things (IoT): a review. J. Comput. Netw. Commun. 11, 1–14 (2019)

    Google Scholar 

  3. U-Blox Homepage. https://www.u-blox.com/en/blog/IP-versus-soap-iot-communications. Accessed 18 July 2021

  4. Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)

    Article  Google Scholar 

  5. Zhang, H., Zhang, T.: Short paper: ‘A peer to peer security protocol for the internet of things’: secure communication for the sensible things platform. In 18th International Conference on Intelligence in Next Generation Networks, France, pp. 154–156. IEEE (2015)

    Google Scholar 

  6. Kajwadkar, S., Jain, VK.: A novel algorithm for DoS and DDoS attack detection in Internet of Things. In 2018 Conference on Information and Communication Technology (CICT), India, pp. 1–4. IEEE (2018)

    Google Scholar 

  7. Esquiagola, J., Costa, L., Calcina, P., Zuffo, M.: Enabling CoAP into the swarm: a transparent interception CoAP-HTTP proxy for the Internet of Things. In: 2017 Global Internet of Things Summit (GIoTS), Switzerland, pp. 1–6. IEEE (2017)

    Google Scholar 

  8. Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), India, pp. 859–864. IEEE (2016)

    Google Scholar 

  9. Colitti, W., Steenhaut, K., Caro, N.D.: Integrating wireless senso: networks with the web. In: Extending the Internet to Low Power and Lossy Networks (2011)

    Google Scholar 

  10. Mano, Y., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput. Commun. 89(90), 178–190 (2016)

    Article  Google Scholar 

  11. Miraz, M., Ali, M., Excell, P., Picking, R.: Internet of nano-things, things and everything: future growth trends. Future Internet 10(8), 68 (2018)

    Article  Google Scholar 

  12. Soni, D., Makwana, A.: A survey on MQTT: a protocol of Internet of Things (IoT). In: International Conference on Telecommunication, Power Analysis and Computing Techniques (2017)

    Google Scholar 

  13. Hwang, H.C., Park, J., Shon, J.G.: Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wirel. Pers. Commun. 91(4), 1765–1777 (2016)

    Article  Google Scholar 

  14. Razzak, F.: Spamming the Internet of Things: a possibility and its probable solution. Procedia Comput. Sci. 10, 658–665 (2012)

    Article  Google Scholar 

  15. Alansari, Z., et al.: Internet of Things: infrastructure, architecture, security and privacy. In: 2018 International Conference on Computing, Electronics and Communications Engineering (iCCECE), UK, pp. 150–155. IEEE (2018)

    Google Scholar 

  16. Sundareswaran, V., Mahesh, K., Rajesh, M., Salmon, S.: Survey on smart agriculture using IoT. Int. J. Innov. Res. Eng. Manage. (IJIREM) 5(2), 62–66 (2018)

    Google Scholar 

  17. Tadejko, P.: Application of Internet of Things in logistics-current challenges. Econ. Manag. 7(4), 54–64 (2015)

    Google Scholar 

  18. Hussain, I., Negi, M.C., Pandey, N.: Proposing an encryption/decryption scheme for IoT communications using binary-bit sequence and multistage encryption. In: 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), India, pp. 709–713. IEEE (2018)

    Google Scholar 

  19. Jhosh, A.: Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. Int. Res. J. Eng. Technol. 7(6), 4656–4658 (2020)

    Google Scholar 

  20. Panda, M., Nag, A.: Plain text encryption using AES, DES and SALSA20 by Java based bouncy castle API on Windows and Linux. In: 2015 Second International Conference on Advances in Computing and Communication Engineering, India, pp. 541–548. IEEE (2015)

    Google Scholar 

  21. Dibas, H., Sabri, K.E.: A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In: 2021 International Conference on Information Technology, Jordan, pp. 344–349. IEEE (2021)

    Google Scholar 

  22. Rihan, S.D., Khalid, A., Osman, S.E.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. 4(12), 151–154 (2015)

    Google Scholar 

  23. Muhammad, G., Rahman, S.K.M.M., Alelaiwi, A., Alamri, A.: Smart health solution integrating IoT and cloud: a case study of voice pathology monitoring. IEEE Commun. Mag. 55(1), 69–73 (2017)

    Article  Google Scholar 

  24. Github Homepage. https://github.com/RimshaZahid/IOTEncryption

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rimsha Zahid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zahid, R., Anwar, M.W., Azam, F., Amjad, A., Mukhtar, D. (2022). Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol. In: Lopata, A., Gudonienė, D., Butkienė, R. (eds) Information and Software Technologies. ICIST 2022. Communications in Computer and Information Science, vol 1665. Springer, Cham. https://doi.org/10.1007/978-3-031-16302-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16302-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16301-2

  • Online ISBN: 978-3-031-16302-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics