Reference Hub2
Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes

Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes

Hamza Sajjad Ahmad, Muhammad Junaid Arshad, Muhammad Sohail Akram
Copyright: © 2021 |Volume: 12 |Issue: 3 |Pages: 13
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781799861669|DOI: 10.4018/IJERTCS.2021070101
Cite Article Cite Article

MLA

Ahmad, Hamza Sajjad, et al. "Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes." IJERTCS vol.12, no.3 2021: pp.1-13. http://doi.org/10.4018/IJERTCS.2021070101

APA

Ahmad, H. S., Arshad, M. J., & Akram, M. S. (2021). Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 12(3), 1-13. http://doi.org/10.4018/IJERTCS.2021070101

Chicago

Ahmad, Hamza Sajjad, Muhammad Junaid Arshad, and Muhammad Sohail Akram. "Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 12, no.3: 1-13. http://doi.org/10.4018/IJERTCS.2021070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.