Evaluation of Advanced Information Security Scheme in Internet of Things Environment for Intelligent Monitoring Applications | ||||
Journal of Computing and Communication | ||||
Article 1, Volume 3, Issue 1, January 2024, Page 1-21 PDF (1.77 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/jocc.2024.339916 | ||||
View on SCiNiTO | ||||
Authors | ||||
Mohamed Gaber 1; Ashraf Khalaf2; Imbaby Mahmoud3; Mohamed El Tokhy4 | ||||
1Egyptian Atomic Energy Authority, Egypt. | ||||
2Electric Communications and Electronics Department, Faculty of Engineering, Minia University, Egypt | ||||
3National Center for Radiation Research and Technology, Egyptian Atomic Energy Authority, Cairo, Egypt. | ||||
4Engineering and Instrumentation Department, NRC, Egyptian Atomic Energy Authority, Egypt. | ||||
Abstract | ||||
In recent years, the Internet of Things (IoT) technologies have been developed to make great progress for nuclear energy applications. These applications require advanced schemes to secure sensitive information from incremental attacks and sabotage processes. The schemes should meet the major security attributes, including confidentiality, availability, and integrity. This paper introduces an information security scheme for transmitting sensitive information with secure monitoring of the critical radiation levels at nuclear facilities. It is evaluated by integrating the cryptography and steganography techniques with cloud computing services. The cryptography techniques are based on Advanced Encryption Standard (AES) and Rivest, Shamir-Adleman (RSA) algorithms. The scheme uses the extracted cryptography keys from authenticated biometric attributes and is suitable for emergencies through a low computational time. It allows securing access for encrypted sensitive measurements, files, and images with high data integrity and confidentiality. Furthermore, it hides confidential, sensitive information with great Capacity and imperceptibility through the transmitted carrier images. The security performance analysis ensures the robustness of the introduced scheme against various attacks through authentication, encryption, and information-hiding techniques. Finally, the paper discusses the resistance of the introduced scheme against serious attacks such as the man in the middle, noise, and Distributed Denial of Service (DDOS) attacks. | ||||
Keywords | ||||
Secure Monitoring; Steganography; Internet of Things; Cryptography; AES; RSA; Nuclear Facilities | ||||
References | ||||
[1] Bhardwaj A., Subrahmanyam G., Avasthi V., and Sastry H.:Security algorithms for cloud computing. In: International Conference on Computational Modelling and Security, Elsevier, India, 2016(85), 535-542. DOI:10.1016/j.procs.2016.05.215.
[2] Bairagi K., Khondoker R., and Islam R.: An efficient steganographic approach for protecting communication in critical infrastructures of the Internet of Things (IoT). Information Security Journal: Global Perspective, 2016(25), 197–212. DOI: 10.1080/19393555.2016.1206640.
[3] Muniraj M., Qureshi A., and Bharathi N.: Geo-tagged Internet of Things (IoT) device for Radiation Monitoring. In: International Conference on Advances in Computing, Communications and Informatics, IEEE, India, 2017(2017), 431-436. DOI:10.1109/ICACCI.2017.8125878.
[4] ELhoseny M., Ramirez-Gonzalez G., Abu-ELnasr O., Shawkat S., Arunkumar N., and Farouk A.:Secure medical data transmission model for IoT-based healthcare systems.Proc IEEE, 2018(6), 20596 – 20608, 2018.DOI: 10.1109/ACCESS.2018.2817615.
[5] Hu J., Chen C., Fan C., and Wang K.: An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. Journal of Sensors, Hindawi, 2017(2017), 1–11. DOI: 10.1155/2017/3734764.
[6] Kim S., Lim H., Lim S., and Shin I.: Study on cyber security assessment for wireless network at nuclear facilities. In: 6th International Symposium on Digital Forensic and Security, IEEE, Turkey, 2018. DOI:10.1109/ISDFS.2018.8355332.
[7] Talbi M.: Speech Signal Embedding into Digital Images Using Encryption and Watermarking Techniques.Springer, 2020, 1–11. DOI:10.1109/ICCEA.2004.1459412.
[8] Xu Z., Liu W., Huang J., Yang C., Lu J., and Tan H.: Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. Security and Communication Networks Journal, Hindawi, 2020 (2020), 1-13. doi.org/10.1155/2020/8872586 [9] Abdullahi M., Baashar Y., Alhussian H., Alwadain A., Aziz N., Capretz L. F., and Abdulkadir S.: Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics Journal, MDPI, 11(198), 1-27, 2022.
[10] Kotenko I., Izrailov K., and Buinevich M.: Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches. Sensors Journal, MDPI, 22(1335), 2022. [11] Lee J., Jeong K., Kim J., and Im C.: The development of remote wireless radiation dose monitoring system. In: 4th International Conference on Advancements in Nuclear Instrumentation Measurement Methods and their Applications, IEEE, Portugal, 2016. DOI:10.1109/ANIMMA.2015.7465285.
[12] Gaber M., Mahmoud I., Seddik O., and Zekry A.: Development of Routing protocols in Wireless Sensor Networks for Monitoring Applications. Faculty of Engineering, Ain-Shams University, Master Thesis, 2016.
[13] Hajjaji Y., Boulila W., Farah I., Romdhani I., and Hussain A.: Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 1-17, 2021. https://doi.org/10.1016/j.cosrev.2020.100318 [14] https://sightengine.com, accessed in Jan, 2020
[15] Jhanjhi N., Humayun M., and Almuayqil S.: Cyber Security and Privacy Issues in Industrial Internet of Things. Computer Systems Science & Engineering Journal, Tech Science Press, 1-20, 2021.DOI:10.32604/csse.2021.015206
[16] Gupta H. and Varshney G.: A Security Framework for IOT Devices against Wireless Threats. In: 2nd International Conference on Telecommunication and Networks (TEL-NET 2017), 2017. DOI:10.1109/TEL-NET.2017.8343548.
[17] Mousavi S., Ghafari A., Besharat S., and Afshari H.: Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems. Journal of Ambient Intelligence and Humanized Computing, 2021(12), 2033–2051, 2021. https://doi.org/10.1007/s12652-020-02303-5
[18] Savitha V., Karthikeyan N., Karthik S., and Sabitha R.: A distributed key authentication and OKM‑ANFIS scheme based breast cancer prediction system in the IoT environment. Journal of Ambient Intelligence and Humanized Computing, 2021(12), 1757–1769, 2021. https://doi.org/10.1007/s12652-020-02249-8 [19] Rabiah A., Ramakrishnan K., Liri E., and Kar K.: A lightweight authentication and key exchange protocol for IoT.In:Workshop on Decentralized IoT Security and Standards, USA, 2018. DOI: 10.14722/diss.2018.23004.
[20] Devi M. and Sharma N.: Improved detection of least significant bit steganography algorithms in color and gray scale images. Proceedings of RAECS UIET, IEEE, Panjab University Chandigarh, 2014. DOI:10.1109/RAECS.2014.6799507.
[21] Saleh M., Aly A., and Omara F.: Data security using cryptography and steganography techniques. International Journal of Advanced Computer Science and Applications, 2016(7), 390-397. DOI:10.14569/IJACSA.2016.070651.
[22] Ansari A., Mohammadi M., and Parvez M.: A comparative study of recent steganography techniques for multiple image formats.International Journal of Computer Network and Information Security, 2019(11), 1-11. DOI:10.5815/ijcnis.2019.01.02.
[23] Usman M., Ahmed I., Aslam M., Khan S., and Shah U.: SIT: A lightweight encryption Algorithm for Secure Internet of Things. International Journal of Advanced Computer Science and Applications, 2018(8), 1–10. Doi:10.14569/IJACSA.2017.080151.
[24] Duraisamy S., Krishnasamy P., Jacaob J., and Duraisamy J.: Enhancement of Security and QoS in Wireless Medical Sensor Networks Journal of Computer Science and Engineering, 14(2), 66-75, 2020. http://dx.doi.org/10.5626/JCSE.2020.14.2.66
[25] Hussain R. and Abdullah I.: Review of different encryption and decryption Techniques used for security and privacy of IoT in different applications.In: 6th International Conference on Smart Energy Grid Engineering, IEEE Access, Canada, 2018, 293 – 297. DOI:10.1109/SEGE.2018.8499430.
[26] Kalra S. and Sood S.: Secure authentication scheme for IoT and cloud servers. Journal of Pervasive and Mobile Computing, Elsevier, 2015(24), 210-223.
[27] Kim J., Shim M., Hong S., Shin Y. and Choi E.: Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning, Applied Sciences, MDPI, 10 (7009), 1-22, 2020. Doi:10.3390/app10197009 2020 [28] Qiu L., Liu Z., Pereira G., and Seo H.: Implementing RSA for sensor nodes in smart cities. Personal and Ubiquitous Computing Journal, Springer, 2017(21), 807–813, 2017. DOI: 10.1007/s00779-017-1044-y.
[29] Ullo S. and Sinha G.: Advances in Smart Environment Monitoring Systems Using IoT and Sensors. Sensors Journal, MDPI, 20(3113), 1-18, 2020. doi:10.3390/s20113113 [30] Sadikin F., Deursen T., and Kumar S.: A Hybrid Zigbee IoT intrusion detection system using secure and efficient data collection, Internet of Things Journal, 2020(12), 1-18, 2020. https://doi.org/10.1016/j.iot.2020.100306
[31] Wang C., Shen J., Liu Q., Ren Y., and Li T.: A novel security Scheme based on instant encrypted transmission for Internet of Things. Journal of Security and Communication Networks, Hindawi, 2018. DOI:10.1155/2018/3680851.
[32] Jiao S. and Liu R.: A survey on physical authentication methods for smart objects in IoT ecosystem. Internet of Things Journal, 2019(6). DOI: 10.3390/s19051141.
[33] Kponyo J., Agyemang J., Klogo G., and Boateng J.: Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices, Internet of Things Journal, 12, 2020. https://doi.org/10.1016/j.iot.2020.100319
[34] Sharma P. and Rajni: Analysis of Image Watermarking Using Least Significant Bit Algorithm. International Journal of Information Sciences and Techniques, 2012(2), 95-101, 2012. DOI:10.5121/ijist.2012.1409.
[35] Loukhaoukha K., Chouinard J., and Berdai A.: A secure image encryption algorithm based on Rubik's cube principle.Journal of Electrical and Computer Engineering, Hindawi, 2012(2012), 1–13. DOI:10.1155/2012/173931. | ||||
Statistics Article View: 141 PDF Download: 271 |
||||