Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption

Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption

Priyadharshini K., Aroul Canessane R.
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJISP.308304
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the recent trends in the integration of blockchain with the internet of things (IoT), individuals are more concerned about security issues such as user privacy and confidentiality. Public key cryptography is the commonly used scheme for encryption of blockchain data. Since IoT integrates multiple devices, tracking the origin of any problem is a major issue of these systems. Moreover, IoT market system is highly unregulated. This leads to security as the biggest concern of the blockchain intersected IoT devices. To overcome these issues, in this work we propose a new encryption methodology called Chaotic-Rivest–Shamir–Adleman (C-RSA) algorithm. In this methodology, the chaotic systems are integrated with the RSA algorithm. Chaotic sequences are extremely sensitive to initial conditions and control parameters. They also exhibit extreme random behavior. This system achieved high average PSNR of 52.24 and very low MSE of 0.085. Moreover, the key space attained by this system was as high as (2)600.
Article Preview
Top

Introduction

Internet of things (IoT) is a recently trending technology. Owing to the rapid growth of this technology, there is an increasing attention on the security issues faced by this system. IoT is a framework that comprises of multiple smart devices that are connected to a single network using unique identifiers (UID) (Gregorio et al., 2020). Unique identifiers, or UIDs, are numbers and characters that allow items in a computer system to be identified. They show where an object is situated and how to get to it. Within a computer network, unique IDs enable the control and interaction of various objects or abstract datasets. The IoT systems are popularly employed for building dynamic platforms. It comprises of static and mobile objects that are integrated with sensors and actuator devices that are interconnected using internet. The main issues faced by these systems are the privacy issue and the security issue (Jing et al., 2014). All the information in an IoT server are collected and stored in a centralized server unit. Since IoT systems employ centralized server, the chances for the leakage of sensitive information are more (De Montjoye et al., 2014). Blockchain is a paradigm that implements decentralization of data and uses shared and distributed ledger for storage of information. Blockchain system stores data in a decentralized manner without the use of a dedicated centralized server (Novo, 2018). The integration of IoT and blockchain has resulted in a decentralized peer to peer configuration. Users can arrange users into logical various individuals and groups in a peer-to-peer configuration and utilise those groupings to associate certain data or assign tasks to a pre-defined set of members. The chances for fraudulent action in a blockchain are minimal. This is because whenever a new entry is added to the blockchain, the information is transferred to all the nodes in the network. Thus, this system protects from attackers who affect the centralized server to capture the entire network (Reyna et al., 2018). The main security aspect of the blockchain technique is the public key encryption. This comprises of two different keys namely, the public and the private key. The public key is used by nodes to encrypt the data. This key is distributed to all the nodes in the network. The private key is used by a particular node to decrypt the data (Herrera-Joancomartí et al., 2016). In a network that has IoT fused with blockchain, each network entity is equipped with a public key (Sampathkumar et al., 2020). This indicates that every transaction between any two IoT devices can be easily viewed and analysed by other nodes in the network. Thus, the security level is high (Meiklejohn et al., 2013). Every third party can view the transactions that occur in a blockchain enabled IoT system. A public key is a cryptographic code that allows users to receive bitcoins in their accounts by facilitating transactions between parties. The digital signature, which shows ownership of the private key, is verified using the public key. Illegal capture of data by any adversary is completely prohibited by using this decentralized scheme (Garcia, 2020). The additional cost for monitoring such fraudulent actions is minimized by the employment of blockchain in IoT. Thus, the cost of these systems is minimum with enhanced security (Dorri et al., 2017). To further increase the security of these systems, many researchers have merged chaotic systems with the public key cryptography to ensure the security of IoT devices (Zhou et al., 2020). Confusion and diffusion are desired aspects of DES: each bit of ciphertext is reliant on several bits of the key, and altering a single bit of plaintext affects half of the bits of ciphertext on average. DES is reasonably simple to construct because to its Feistel structure and basic logic.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing