Article Preview
TopIntroduction
The concept of the Internet of Things is starting a new era of communication, which is growing very rapidly. Term IoT gives the idea of an environment where devices can communicate with other devices and also with peoples regardless of time and place just with the help of the Internet. This techonology will help the devices to communicate with each wherever they want. This communication will produce some benfical results for humans. IoT is helping us in different fields of life just to make work more accurate and improve the traditional methods. IoT in the smart home application, Intelligent transport system, eHealth system, IoT in agriculture, etc are the field where we are using IoT. (Santhosh Krishna B.V, Gnanasekaran T., 2017). As the network of IoT is consists of different devices and these devices are generating data. Each device in a network is collecting data from the environment with the help of installed sensors. After some processing the collected data will send to the server (Mario F., Pasquale P. 2018). This is the network of millions and millions of devices that are increasing every day. Every device is sharing data. For such a large amount of data we need high security and privacy. Network is consists of hetrogenous devices that is why security and privacy is the most important part for the IoT network. To make an end to end communication secure a lightweight encryption/decryption is required so a device can send secure data within a network (S. Sridhar, Dr. S. Smys, 2017). Although this technology is getting very famous but people don’t want to compromise on data security, data authenticity and confidentiality. We need to securely authenticate our devices within the IoT with the help of suitable encryption techniques. If we talk about authentication we have to work on our authentication methodology to make the entry of a device more secure. For authentication purposes, we need to perform some encryption challenges between the device and the server. Through encryption, we have to make sure that data transfer is fully secure. Encryption techniq needs to be lightweight and provide high security. As IoT devices comes with very low power and low computation resources that’s why lightweigh encryptions are the suitable encryption for IoT (S. Singh, P. K. Sharma, S. Y.Moon, J. H. Park, 2017). Block and stream are two different encryption methods from which we are considering block cipher encryption algorithms because they are very suitable for information security and this encryption is also working well for wireless (K. J. Patel, N. M. Raja, 2015). Stream cipher not a good choice here because it requires high computation resources. DES is one of the popular block encryption algorithm (William S., 2014), (D. Coppersmiths, 1992) but due to its week security, a higher various comes with the name triple DES and then we see another famous block chipper name as AES (Daemen, J., Rijmen, V., 2002).
Block cipher algorithms from the secure and fast encryption routine (SAFER) family are very suitable for this type of lightweight encryption and lightweight devices like Bluetooth. The SAFER has different Variants based on Keys and numbers of rounds of encryption. SAFER K-64, SAFER K-128, SAFER SK-64, SAFER SK-128, SAFER+, and SAFFER++ have belonged to this series of the algorithm (J. L. Masseys, 1993), (M. K. Mahmood, 2017):
- •
Series of the SAFER algorithm is belonging to block cipher because it operates on encryption/decryption byte by byte. That is why it is suitable for embedded applications likes IoT.
- •
Suitable linear substitution transformation is performed on each round of encryption.
- •
Each round of encryption has a different key which is generated by the addition of a constant in the key. This will increase the security of our key (A. Achuthshankar, A. Achuthshankar, 2015).