You are on page 1of 9

A Review of Data Security and Cryptographic Techniques in

IoT based devices


Ghulam Mustafa Rehan Ashraf Muhammad Ayzed Mirza
Department of Computer Science * corresponding Author Department of Computer Science
National textile University Department of Computer Science National Textile University
Faisalabad, Pakistan National Textile University Faisalabad, Pakistan
ghulammustafanfc@gmail.com Faisalabad, Pakistan ayzed@ntu.edu.pk
rehan@ntu.edu.pk

Abid Jamil Muhammad


Department of Computer Science Department of Computer Science
National Textile University National Textile University
Faisalabad, Pakistan Faisalabad, Pakistan
abid.jamil@nu.edu.pk muhammad.dcs@ntu.edu.pk
ABSTRACT Cryptographic Techniques in IoT based devices. In ICFNDS’18:
The idea of the Internet of Things (IoT) is to connect or give International Conference on Future Networks and Distributed
Systems, June 26–27, 2018, Amman, Jordan. ACM, New York,
access to everything to the Internet. IoT environment not
NY, USA, 10 pages. https://doi.org/10.1145/3231053.3231100
only provides the facility of Human to Machine connectivity,
however, it also creates Machine to Machine connectivity.
As everything is going to connect to the Internet and also 1 INTRODUCTION
generating the data. So, the data generating by these devices Internet of Things (IoT) is a system of some interconnected
is growing up rapidly, that huge amount of data is called devices, like digital devices, mechanical machines, things, ob-
Big Data. This data has huge Volume, High Velocity, and jects and peoples. These devices have their unique identifiers
different Variety. The security of this data is a risk. As we and have the capability of transmission of data over the net-
know that, the IoT devices have constraints like low power work without any human-to-human or human-to-computer
and less computational speed and the traditional encryption collaboration [1]. In 1982 Kevin Ashton first time proposed
algorithms like DES, 3DES, and AES are more complex. the term "Internet of Things". His aim was to offer the fa-
Traditional encryption algorithm seems not feasible for IoT cilities of human beings to communicate with the virtual
devices. So, we need to develop Lightweight encryption algo- or imaginary environment [2]. A thing or object in Internet
rithm for IoT devices for secure communication and secure of things (IoT) can be any computing device to whom we
data transmission in IoT environment. Cryptography and can assign an IP address and that device have a capability
Steganography techniques are used for securing the data over to transfer the data over the network. Sensors embedded in
the Internet. Cryptography encrypts the data by using a these devices so that these devices can sense the environment
key and make a ciphertext that cannot be readable by the and collect the data, then this collected data transfer over
normal user. Steganography hides the data by concealing the internet. Internet of Things allows "things" to sensed and
it into another medium like data, image, audio, video, or controlled remotely. With the very fast growth of internet
mixed. This paper provides a review of important lightweight technology, our lives are steadily led into a Virtual World
cryptographic techniques used for IoT devices. [3]. We are going to live in an imaginary space. People can
do anything in this virtual world, like shopping, chat and
KEYWORDS work.Internet of things is a new emerging domain which will
Lightweight, Security, IoT, Cryptography, Stenography, En- bring a huge change in the real life of human beings.
cryption, Decryption, Ciphers, Big Data IoT concept of connecting everything to the internet is
the main reason for generating the Big Data. Big Data is
ACM Reference Format:
also an emerging field and the latest topic of interest [4]. IoT
Ghulam Mustafa, Rehan Ashraf, Muhammad Ayzed Mirza, Abid
Jamil, and Muhammad. 2018. A Review of Data Security and
devices increasing day by day, and the data generating by
them also increases. The structure, un structure and multi-
ACM acknowledges that this contribution was authored or co-authored structure data generating by IoT devices. The main sources
by an employee, contractor or affiliate of a national government. As of big data are Clouds, Mobile Devices, Social media, and
such, the Government retains a nonexclusive, royalty-free right to
publish or reproduce this article, or to allow others to do so, for Networking websites. Big Data concept can be understood by
Government purposes only. its three V’s characteristics, Volume, Velocity, and Variety.
ICFNDS’18, June 26–27, 2018, Amman, Jordan Volume characteristic of big data describes that how much
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-6428-7/18/06. . . $15.00 space is required to store it? Volume is a massive amount of
https://doi.org/10.1145/3231053.3231100 data generated by any source.Velocity is the speed at which
ICFNDS’18, June 26–27, 2018, Amman, Jordan G. Mustafa, R. Ashraf, A. Mirza, A. Jamil, Muhammad

the data is generated, store, and transfer from one node internet is defined as the communication of the hosts over the
to another. Velocity characteristic of big data can also be web. It becomes mobile-internet when mobile devices involved
defined as the time taken by data from system to cloud or in this scenario. Overall it becomes IoT when everything
cloud to system. Variety characteristic of big data defines the connected to the internet like mobiles, homes, refrigerators,
type of data, like structure, unstructured, or multi-structure. cars, machines, and peoples. Figure. 4 shows the three layers
These three V’s of big data are shown in the Figure. 1. architecture of the IoT. Three layers of IoT are Sensing layer,
Transport layer, and Application layer. In IoT everything
is going connected to the internet or everything is going to
become Smart. Just like to make Smart Home, Smart Schools,
Smart Hospitals and Smart Cities. So the Authentication of
each new user or device, which is trying to become part of
this network is also an issue. Due to wireless communication
in IoT, eavesdropping and Man in the Middle attacks are
also possible. The main issues in securing the IoT devices
are:
Confidentiality. Data travel between source and destination,
Machine to Machine, Machine to Human, Human to Human,
or Human to Machine can easily be tracked by attacker or
intruder and secret information can be expose. End-to-End
security is mandatory in IoT. Confidentiality can be achieved
by encryption/decryption.

Figure 1: Three V’s of Big Data Data Integrity. Nobody can change the data at intermediate
stage between source and destination. When data travel on
the internet, intruder attacks on that data. We should apply
some techniques to secure the traveling data so that the
Applications of Internet of Things are in every field. There
intruder can not change or modify the data, if they success
are some applications of Internet of Things, Like Smart Home,
to achieve the data.
Smart City, Health Care, Agriculture, Transportation, Smart
Factory, Supply Chain, Emergency, User Interaction, Retail Authentication. Communicating entities should be able to
and Lifestyle. authenticate each other. So that they can ensure that they
are communicating with the claimed entities.
Human IoT Trust Relationship. Trust is not defined for
human beings only, it also be defined for Device or System.
Trust defined as human to human, human to device, device
to device and device to human.
The rest of this paper is structured as follows: Section 2
describes the background of cryptography and steganogra-
phy. Section 3 describes the Literature Review of lightweight
cryptography and the combined effect of cryptography and
steganography techniques. Section 4 gives the brief analysis
of literature review. Section 5 describes the brief conclusion.

2 BACKGROUND OF SECURITY
TECHNIQUES
Figure 2: Definition of Internet of Things
Steganography
"Steganography derived from two Greek words ’steganos’
Figure. 2 shows the concept of IoT. The IoT’s concept which means either secret or covered and ’graphein’ which
of anything, anytime, anyone, anyplace, any service and means writing or drawing" [6]. Which shows that steganogra-
any network changes its benefits into drawbacks, if security phy means secret writing, secret drawing, covered writing, or
privacy is not abundant. For example, if there is not enough covered drawing. About 2000 years ago, the Greek used this
security and privacy then any one can have access to any technique to transfer secret messages. Steganography means
other’s personal information. The security and privacy in IoT hiding a secret message within another message. Steganog-
is a big issue because there is no restrictions on its way. Figure. raphy is used to hide secret data into the non-secret data.
3 explains the IoT concept more precisely. Which defines that The file in which the secret data is concealed is called the
a network is consists of the host to host communication. The carrier. After concealing the secret data the modified carrier
A Review of Data Security and Cryptographic Techniques in IoT based devices ICFNDS’18, June 26–27, 2018, Amman, Jordan

Figure 3: Senario of Internet of Things [9]

looks like an original carrier. Some best carriers are images, [8]. There are two main types of Cryptography, Symmetric
audio and video files. In steganography, we do not encrypt key cryptography and Asymmetric cryptography.
the data, we simply conceal our data within image, audio or
video files. Symmetric Key Cryptography
In symmetric key cryptography same key is used for encryp-
Cryptography tion and decryption. The sender encrypts the data by using
the secure key and the same key is used by the receiver to
Cryptography is used to build security. Cryptography is a
decrypt the data. The sender and receiver negotiate the key
powerful tool to protect the data. Our computer password
by a secure channel to start the conversation. There are many
is secured by cryptographic hash function. When we send
algorithms that are based on symmetric key cryptography,
an email, it’s also secure by cryptography technique SSL.
like Caesar cipher, Block cipher, Stream cipher, DES (Data
Cryptography concern with confidentiality (no one can ac-
Encryption Standard), and AES (Advanced Encryption Stan-
cess the data except the person to whom it may concern),
dard).
integrity (no one can change or modify the data), and au-
thenticate (sender and receiver conform their identity) [6].
Asymmetric Key Cryptography
Cryptography is used to store and transfer the data in such
a form that only sender and receiver can understand it or Asymmetric Cryptography also called public key cryptogra-
process it. An intruder can not access or understand that phy. In this technique, two different keys are used for encryp-
data. Cryptography depends upon the algorithm and the tion and decryption. These two keys are known as a public
key. Two main terms used in cryptography encryption and key and private key. Sender and receiver have its own public
decryption. Encryption is a process to convert a plain text and private keys. One key is used for encryption and the other
into cipher text and decryption is the process to convert key is used for decryption. The private key is a secret key,
cipher text to plain text. private key never expose. Public key announced to others. If
a sender wants to send data to the receiver, it will encrypt
the data by using the receiver’s public key. On the other end,
Lightweight Cryptography the receiver will decrypt the data by using its own private key.
In Internet of Things machines connected to machines or There are many algorithms that are based on asymmetric or
machines connected to human to communicate or to send public key cryptography, like Diffie-Hellman, RSA (Rivest -
data. IoT devices have less computational power, so we need Shamir - Adleman) and Elliptic Curve Cryptography (ECC).
to design lightweight encryption techniques to encrypt the
data. Lightweight Cryptography is used in a constrained en- 3 LITERATURE REVIEW
vironment like RFID tags, healthcare devices, and sensors Many algorithms and techniques have been proposed to secure
[7]. While developing Lightweight Cryptography techniques, the data generated by IoT devices. In the following section,
we must have to take into consideration the software and we have shown a number of current security algorithm and
hardware specification. For example, how much energy it will techniques that used to encrypt the data generated by IoT
consume? How much time will it take to encrypt the data? devices.
How much is RAM size required to run it? Lightweight Cryp- For designing a lightweight cipher for the Internet of Things
tography does not means, that it will compromise the security Muhammad Tausif et al. [10] evaluated 13 lightweight ciphers.
ICFNDS’18, June 26–27, 2018, Amman, Jordan G. Mustafa, R. Ashraf, A. Mirza, A. Jamil, Muhammad

Figure 4: Layers Architecture of Internet of Things [1]

Internet of Things changing our lives aspects towards smart- devices are necessarily smaller in size and low powered. How-
ness like smart home, smart health, and smart cities. IoT ever, encryption algorithms are more complex and consume
based on physical objects which use sensors to collect data the energy of IoT devices. So a lightweight encryption algo-
and actuators to share the data with other objects. Smart rithm is proposed, that is a symmetric key algorithm and
things having controlled resources like limited battery and uses a 64-bit key to encrypt the 64-bit block cipher. The
small size RAM. So, lightweight ciphers required for IoT suggested algorithm was a hybrid method. The algorithm has
to secure communication. To secure communication on the only 5 rounds which consume less energy. Each round needs
Internet of Things 13 lightweight ciphers were evaluated. The a unique key, so it uses 5 keys for encryption and decryption.
lightweight ciphers were evaluated on three parameters: RAM, The proposed algorithm was evaluated on different criteria
code size, and execution time and analysis the performance to check its security strength. Key Sensitivity, Execution
of these ciphers on a different platform: 8 bit, 16 bit and 32 Time, Image Histogram & Entropy, Memory Utilization and
bit. The proposed solution was checked on different parame- Correlation were the evaluation parameters. On ATmega 328
ters like key size, block size, SBox, round function, number platform, the algorithm used 22 bytes of memory, and it takes
of rounds, structure, key scheduling, code size, RAM and 0.188 milliseconds execution time, and 0.187 milliseconds for
Execution Time. Association rule mining was used to check encryption and decryption. The Avalanche test showed that
the relationship between performance parameters and the a single bit change in key or plain text brings about 49 &
component elements of the lightweight ciphers. The results change in the ciphertext.
have shown some guidelines to design lightweight ciphers. A dynamic key approach proposed by Manish Kumar et
Designers must have to keep in mind the fewer device re- al. [12] to secure the Internet of Things. Nowadays a major
sources like memory, execution time and code size. Key must area of interest is data security of digital world as IoT, where
be fixed and take small space. In short, it provides basement devices communicate with other devices. It makes human life
to enhance the cipher in several ways like code size, size of simpler but the security of the data produces by them is a
memory, and execution time. risk. The proposed dynamic key approach was symmetric key
Muhammad Usman et al. [11] proposed a lightweight en- encryption Symmetric key encryption. Which used a 128-bit
cryption algorithm and named as Secure IoT. Billions of key that could not be accessed by brute force attack. That
devices are connected to the Internet of Things. That are takes data of 8 bytes as an input and generates a fixed cipher-
generating a big data and security of big data is a risk. IoT text of 8 bytes as output. That calculates sixteen subkeys of
8 bits from the 128-bit key. Then shuffling processes is used
A Review of Data Security and Cryptographic Techniques in IoT based devices ICFNDS’18, June 26–27, 2018, Amman, Jordan

to repel the known plaintext attack, and at the end diffusion LSB substitution with the proposed MSB - LSB substitution
process used for avalanche effect. The proposed solution was scheme of steganography technique. The results show that
checked on different negative aspects like different keys for MSB - LSB Substitution scheme performs better than simple
encryption and decryption, a slight change in key, a slight LSB substitution scheme of steganography.
change in plain text, and wrong ciphertext. The results have Another novel approach for securing the IoT was offered by
shown that the model was able to detect all these slight Bouchra Echandouri, et al. [15] named as a lightweight mes-
changing and its ciphertext could not be decrypted. The sys- sage authentication code protocol using cellular automata,
tem was able to detect the minor changing. The key length based on keyed hash function LCAHASH-MAC. RFID tags
was satisfactory to protect it from brute force attack. It used are the significant components of IoT. RFID tags automati-
an equal number of bits of output ciphertext and input plain cally detect the target signal, collect and send the instruction
text, to save the network bandwidth. to the controller. There are many security threats for these
Jagdish Patil et al. [13] introduced a lightweight block tags, the major threat is data authentication e.g snooping,
cipher technique named as LiCi. They proposed an encryption replay attack, relay attack, Counterfeiting etc. These RFID
technique that uses a 128-bit key to encrypt the 64-bit plain tags have restrictions on memory size and computational
text, to produce 64-bit cipher. It uses 4-bit input and 4-bit capabilities. So, lightweight cryptography techniques used
output S-box. It divides the 64-bit plain text into two halves. to secure them. The proposed solution based on three algo-
From 128-bit key, it abstracts left most significant bits and rithms. The first algorithm was sub keys generation using
uses as the first round key, and next left most significant bits the Pseudo-random number generators, to provide resistance
are used as second round key. LiCi technique has 31 rounds. against key recovery attack. The second algorithm was to
The proposed solution was evaluated on different parameters, generate MAC of the message. The input of the algorithm
like block size, key size, execution time, throughput and was a message of any length (make chunks of 512 bits) and
number of cycles. LiCi cipher was also compared with other a key which calculated in the first step. The last step is the
lightweight ciphers on the base of hardware performance verification of MAC. The input of the step was the message,
like power consumption, flash memory used and GE,s. LiCi key and the tag which was generated in the second step.
uses 1944 bytes of memory and it requires 1153 GE,s (Gate The output of this step was valid or invalid. The main se-
Equivalents) to encrypt the 64- bit data with a 128-bit key. curity aspect of the keyed hash function was that it should
LiCi cipher consumes 30mW power that was less power as resist against key recovery attack. Exhaustive research key
compared to other existing techniques. It resists the linear attack was infeasible because it will require approximately
and differential attacks. years to get the right key. Key sensitivity test showed that
Ria Das et al. [14] suggested a hybrid approach that com- one-bit change in key affects approximately 50% change in
bines the benefit of both cryptography and steganography the output. The computational complexity of the proposed
to achieve the Confidentiality and Data Integrity. With the algorithm was O(n). Traditional cryptographic techniques
benefits of IoT, the IoT security has always been a serious provide security very well but these were not applicable to
issue. The prime attack on IoT devices is a loss of confidential constrained devices like RFID. So, a lightweight message au-
information or modification of this information that is called thentication code technique based on LCASHAH, proposed
Confidentiality and Integrity. Cryptography is used to prevent in [13] to deny access to unauthorized entities and to provide
the Integrity attacks and Steganography is used to prevent security. The results showed that the proposed algorithm
the confidentiality attacks. The presented model divided into was more secure and fast as compared to other well-known
two phases. In first phase data transmission between IoT hash-based message authentication techniques.
sensor device and the home server. The IoT devices have lim- Chaitanya Bapat, et al. [16] provided a hybrid technique
itations with respect to power, memory and computational that combines the benefit of both cryptography and steganog-
abilities. So, a combination of simple steganography (LSB raphy. IoT systems consist of electronic devices, computing
substitution) and lightweight cryptography (XOR operation) devices, household devices, and sensors. Thanks to IoT de-
proposed for IoT device to home server data encryption. In vices, which make it possible to control household devices
second phase data transmission between home server and through mobile phones. In our daily life, it is very difficult for
cloud. So, there are no resource constraints. A combination us to sustain different keys of mechanical locks. Hence these
of steganography (MSB-LSB substitution) and Advanced locks were replaced by smart locks or electromagnetic locks.
Encryption Standard (AES) / Data Encryption Standard Despite that, the smart locks provide us easiness and comfort-
(DES) used for encryption in this phase. The experiments of ability, the security issue arises due to IoT based smart locks
the proposed solution were conducted using Matlab R2013a. like MITM (Man In The Middle) attack. In the proposed
Dataset takes from 1 to 100 characters. Simple XOR used scheme a Bluetooth Low Energy (BLE) protocol was used
for encryption, MD5 used for creating message digest and to connect smart lock to the key. BLE protocol capable to
LSB substitution steganography used between IoT devices transfer data between IoT devices and smartphones. MITM
to the home server. AES/DES used for encryption, then attack can be carried out in BLE protocol. To handle the
MD5 used for creating a hash and MSB-LSB substitution issue a combination of cryptography and steganography was
steganography technique proposed for data encryption, be- proposed, Confidentiality achieved by the steganography and
tween the home server and cloud. They compare the simple Integrity achieved by the cryptography. It was a server-client
ICFNDS’18, June 26–27, 2018, Amman, Jordan G. Mustafa, R. Ashraf, A. Mirza, A. Jamil, Muhammad

model, on the client (Android Smart Phone) side, the user devices generating a huge amount of data called big data.
enters the key that was encrypted by AES algorithm and Currently, multimedia big data is the biggest big data, as it
then the ciphertext was embedded in an image. The image generates 60% internet traffic and 70% mobile phones traffic.
was sent by using BLE protocol. On the server side, the The main issue of multimedia was its security. Symmetric key
ciphertext extracted from the image and then decrypted that encryption algorithms were used to secure data generated by
ciphertext to get the key. The algorithm checks the valid key IoT devices, these algorithms require a more computational
and then take the decision to open the lock or not. Evaluation cost for multimedia big data. The proposed system does
parameters of the proposed technique were the size of the not require an additional key for encryption. So, does not
image, dimensions of the image and time taken to encode, require key distribution and updating of the key. The pro-
encrypt, sent, receive, decrypt and decode. Lesser the image posed scheme generate a key from the data by using Feistel
size, faster it transferred. As the BLE protocol has different Encryption Scheme. It takes input files as multi-size blocks
issues including MITM (Man in the Middle) attack. By using (each block size is 256 bit). Then each block divided into
the combination of cryptography and steganography elim- key and plain text. Key encrypted using Feistel Encryption
inate the threat of MITM attack. Steganography provides Scheme and plaintext encrypted using AES algorithm. AES
the confidentiality, an intruder cannot differentiate between generate a ciphertext of data by performing 10 rounds of
2 images, original image and the other image that has data encryption and a unique key for all rounds. Finely Genetic
encoded in it. Cryptography prevents the integrity attacks. Algorithm used to integrate cipher key and cipher data. On
Sunggyun Jang, et al. [17] proposed an efficient device the other side, decryption was the reverse of the encryption
authentication protocol without certification authority for scheme. There were some Performance parameters of the
IoT. Wireless devices are used for Internet of Things (IoT), proposed scheme. Size of the input file, running time and
like RFID, Bluetooth, and ZigBee. As IoT technology grows throughput of symmetric key encryption algorithms (MARS,
rapidly the possibility of information leakage and hacking 3DES, DES, RC6, and Blowfish) and avalanche effect. The
also increasing. Hacking tools enable the intruder to access different symmetric key algorithm used different key size,
the information stored in the memory of wireless devices. IoT different plaintext size and a different number of rounds. The
devices should not allow accessing the information without proposed system was built to secure multimedia big data
authentication. For this issue, the different protocol has been against real-time attacks like DoS and tampering attacks.
proposed, like DTLS, SSL/TLS. DTLS protocol requires six The results show that the proposed system gives the best
message packet exchange, and if a packet loss, it will retrans- security for multimedia big data. The results show that the
mit all packets from the beginning, which was not affordable proposed solution has less running time for encryption and
in IoT environment. So, a lightweight authentication protocol decryption and has the highest throughput for encryption
for IoT devices proposed. The proposed authentication have and decryption and has highest avalanche effect as compared
some steps: to others symmetric key algorithm.
Rini Indrayani, et al. [19] presented a combination of cryp-
1 The device sends MAC address or serial number to the
tography and steganography to enhance the security of the
target device by using AES Encryption technique.
transmitting data over the network. There are different lev-
2 The target device builds the hash tree and send the
els of confidentiality of exchanging data, like personal data,
timestamp to the device, and encrypt its message by
organizational data or state data. So the security of the
using AES technique.
confidential data is an important issue. Many cryptographic
3 The device forms the hash tree by using the same hash
algorithms developed to secure the data. Steganography is
tree algorithm used by the target device.
one of them, which used to hide important data into another
4 The Root Hash is transmitted for authentication, the
data so that it cannot detect. Nowadays, different tools avail-
target device authenticates, and hash shake completes.
able in the market that has an ability to detect any use of
There were three Evaluation parameters of the proposed steganography. Therefore, a combination of steganography
scheme. First was authentication delay time, the initial au- and cryptography proposed. The mp3 audio file used as a
thentication time and re-authentication time. The second was carrier file for steganography. Detection of the mp3 audio file
code size and the third was power consumption. By compar- as a data file, not an easy task because the mp3 file generally
ing with the existing authentication protocol, the proposed used over the internet for entertainment. The secret data em-
protocol was more efficient and used less number of messages bedded in the mp3 audio file after encrypted with Advanced
exchanged. The proposed protocol was based on a keyed Encryption Standard (AES) using a key that process with
hash algorithm and not require a certification authority. The MD5 hash function. The secret data file that sender wants to
security was achieved on every step by using the Advanced embed could be of any type like text, image, video or audio.
Encryption Standard to encrypt the messages, exchanged At very first step key processed with the Message Digest 5
between device and target device. (MD5) and then Advance Encryption Standard (AES) applied
Shadi Aljawarneh, et al. [18] introduced a resource effi- to secret data and that key to encrypt the secret message.
cient encryption model to encrypt the multimedia big data. The encrypted secret message embedded or encoded into the
IoT widely used in various areas, like academic, industries, homogeneous frame of an mp3 audio file. Only that mp3
healthcare, wireless networking, and communication. IoT files can be used for steganography that has a homogeneous
A Review of Data Security and Cryptographic Techniques in IoT based devices ICFNDS’18, June 26–27, 2018, Amman, Jordan

Table 1: Comparision of Lightweight Security Algorithms in IoT


(S-Box = Substitution Box, AES = Advance Encryption Standard, MD5 = Message Digest, SHA = Secured Hash Function, LSB
= Least Significant Bit, MSB = Most Significant Bit, MAC = Message Authentication Code, OTP = One Time Pad, PRN =
Pseudo Random Number, C = confidentiality, I = Integrity, A = Authentication)

Author Technique Used Algorithm used Structure Based Input Size Cipher Size Key Length Rounds Char Security
Cryptography & 1 to
Muhammad Usman et al. [11] SIT (Secure IoT) Feistel & Substitution 64 bit 64 bit 64 bit 5 C,I,A
Steganography 100
8 byte or 8 byte or
Manish Kumar et al. [12] Cryptography Dynamic Key Shuffling & Diffusion 128 bit - - I
64 bit 64 bit
Feistel &
Jagdish Patil et al. [13] Cryptography LiCi 64 bit 64 bit 128 bit 31 - I
S-Boxes
Cryptography & S-Box, LSB, 1 to
Ria Das et al. [14] AES/DES, MD5 128 bit 128 bit 128 bit 10 C,I,A
Steganography LSB-MSB 100
MAC, Hash,
Charifa Hanin et al. [15] Cryptography LCAHASH-MAC 512 bit 512 bit 512 bit - - I,A
PSOCA
Cryptography &
Chaitanya Bapat, et al. [16] AES S-Box, LSB 128 bit 128 bit 128 bit 10 - C,I,A
Steganography
Hash Function
Sunggyun Jang, et al. [17] Cryptography AES, SHA128 128 bit 128 bit 128 bit 10 - A
MAC
AES, Feistel, & 256 bit word,
Shadi Aljawarneh, et al. [18] Cryptography Feistel, S-Box 256 bit 128 bit 10 - I
Genetic Algo 128 bit
Homogeneous
Cryptography &
Rini Indrayani et al. [19] AES, MD5 Frame, 128 bit 128 bit 128 bit 10 audio C,I,A
Steganography
S-Box
Confusion,
Cryptography &
Mani Bharathi.V et al. [20] Chaos Diffusion, 256 bit 256 bit 256 bit - image C,I
Steganography
LSB, MSB
Cryptography & Dynamic Key LSB, MSB
Nikhil Patel et al. [21] 128 bit 128 bit 128 bit - image C,I
Steganography Approach PRN
One Time
Mrudula Sarvabhatla et al. [22] Cryptography OTP, Hash - - - - - A
Pad

frame. The reverse of this performed on the receiver side cover image and LSB of the secret message will become the
to obtain the original message. The proposed solution was LSB of the second half of cover image. The proposed solution
evaluated by testing the mp3 audio file on these perspectives, has no limitation on the size of the image. The user can use
Steganography Capacity, Recovery Analysis, Steganalysis the image of any size. The results show that steganography
Testing and Frequency Analysis. The results show that mp3 technique using Chaotic technique provides more security
audio file steganography technique using AES encryption and has more applications. The combination of cryptography
technique and MD5 hash function provide more security. The and steganography provides confidentiality and integrity.
combination of cryptography and steganography provides A combination of two types of techniques presented by
confidentiality and integrity. Nikhil Patel, et al. [21] to secure the image transmission. In
Mani Bharathi, et al. [20] also proposed a combination of the first technique, the parameters of the image encrypted
cryptography and steganography for image security. Cryp- that is called cryptography and can easily be sensed by the in-
tography used to hide the data or converting information truder. The second technique was steganography, in which the
to its normal form to unreadable form. Steganography used image hidden within the other image and the intruder cannot
to hide the data so that no one can suspect the data ex- sense it easily. Because its physical appearance remains same.
cept sender and receiver. Steganography used with Chaotic The intruder commonly uses Visual Attacks and Statistical
algorithm gives more security and large key space. In the Attacks on transmission images. The proposed solution used
Chaotic algorithm, a one-bit change can change all output to oppose these two attacks. The proposed scheme based on
bits. In the proposed method the chaotic algorithm used for Least Significant Bit (LSB) and Most Significant Bit (MSB).
encryption and then encrypted message embedded into a col- The Least Significant Bit (that has low information) of the
ored image. Two methods were proposed for generating stego carrier image replaced with Most Significant Bit (that has
image. In the first method, by extracting the Most Significant high information) of the secret image. With the information
bit (MSB) of the message (that has 80% information about hiding technique, the proposed solution also provides security
the message) and replacing it with the Least Significant Bit by using the cryptographic technique. For cryptography, a
(LSB) of the carrier image. Now the resultant has MSB of dynamic key used. In the proposed solution the pixel selection
the message and MSB of the carrier image that is called based on Pseudo Random Number (PRN) generator. Which
stego image. Its visualization is not good and after decoding provides more security. The proposed solution was checked at
it losses 65% data. The second method is same as the first the destination end, by using a slight change in key. Which
method. The difference is that in this method LSB replaced produce a different output. The results show that steganog-
with MSB of the stego image. The proposed method has two raphy technique using dynamic key cryptography provides
steps, the cover image was divided into two halves. The MSB more security. Least Significant Bit (LSB) Steganography is
of the secret message will become LSB of the first half of
ICFNDS’18, June 26–27, 2018, Amman, Jordan G. Mustafa, R. Ashraf, A. Mirza, A. Jamil, Muhammad

more simple and easy way to hide the secure data or image and steganography is used for communication security. Cryp-
within an image. tography provides the Integrity (no one can change/modify
A lightweight authentication service in Hadoop offered by the data) and Steganography provides the Confidentiality
Mrudula Sarvabhatla, et al. [22] using One Time Pad key. (no one can sense or access the data). The literature re-
The Big Data generated by Social media, Mobile devices, and view describes that the combination of both Cryptography
Device to Device connectivity. Traditional databases cannot and Steganography provides the more security. Cryptogra-
handle the unstructured, high speed, and a huge amount of phy and Steganography combination overcomes each other’s
data. So we need to use HDFS i.e Hadoop Distributed File weaknesses. Which gives more security and make it difficult
System, to store and process the big data. The Big Data for the intruder/hacker to access or steal the data.
consists of very sensitive data like Healthcare data, Credit
card data, Government data or individual personal data. REFERENCES
Therefore secure authentication of the entity, which wants to [1] Oracevic, A., Dilek, S., & Ozdemir, S. (2017). Security in inter-
net of things: A survey. 2017 International Symposium on Net-
connect to the HDFS required. The proposed solution based works, Computers and Communications (ISNCC), (June), 1-6.
on two server model authentication system. These two servers https://doi.org/10.1109/ISNCC.2017.8072001
were Registration server and Backend server. In the first step, [2] Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey
of Security and Privacy Issues of Internet of Things.
the user sends a registration request consists of his identity arXiv Preprint arXiv:1501.02211, 7. Retrieved from
ID, and Password (hashed with a random number) to the http://arxiv.org/abs/1501.02211
Registration Server. Registration server receives the request [3] Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet
of things: A review. Proceedings - 2012 International Conference
and calculates the One Time Pad key (OTP). Then it XOR on Computer Science and Electronics Engineering, ICCSEE 2012,
the user ID with the hashed of OTP key, and also XOR the 3, 648-651. https://doi.org/10.1109/ICCSEE.2012.373
[4] Jabbar, S., Malik, K. R., Ahmad, M., Aldabbas, O., Asif, M.,
password with the hashed of OTP key. Then all the calculated Khalid, S., Han, K. J., Ahmad, S. H., "A Methodology of Real-
information sends to the Backend server. Backend server also Time Data Fusion for Localized Big Data Analytics" in IEEE
performs some XOR operation and store all the information ACCESS, IEEE, 2018.
[5] SathishKumar, J., & R. Patel, D. (2014). A Survey on Internet of
in the database. Then Backend server generates a random Things: Security and Privacy Issues. International Journal of Com-
number and sends it to the user. The proposed solution was puter Applications, 90(11), 20-26. https://doi.org/10.5120/15764-
analyzed on Resistance to Offline Password Guessing Attack 4454
[6] Baby, A., Scholar, P. G., & Krishnan, H. (2017). Combined Strength
and Counter to reply attack. The results show that the pro- of Steganography and Cryptography- A Literature Survey, 8(3),
posed authentication scheme was cost-effective because it 1007-1010.
[7] Ahmad, M., Jabbar, S., & Ahmad, A. "A Sustainable Solution to
requires only 15 hash operations. The proposed authenti- Support Data Security in High Bandwidth Health Care Remote
cation scheme opposes the cryptographic attacks with less Locations by using TCP CUBIC Mechanism" in IEEE Transaction
computation cost. The proposed authentication scheme is on Sustainable Computing, , IEEE, 2018.
[8] SathishKumar, J., & R. Patel, D. (2014). A Survey on Internet of
lightweight and more secure. Things: Security and Privacy Issues. International Journal of Com-
puter Applications, 90(11), 20-26. https://doi.org/10.5120/15764-
4454
4 ANALYSIS OF LITERATURE REVIEW [9] Zaragoza, M. G., Kim, H., & Lee, R. Y. Big Data and IoT for
The analysis of literature review shows that the combination U-healthcare Security (2018). Computer and Information Science,
719, 1-11. https://doi.org/10.1007/978-3-319-60170-0
of cryptography and steganography techniques gives better [10] Tausif, M., Ferzund, J., Jabbar, S., & Shahzadi, R. (2017). To-
results as compared to using only cryptography technique to wards designing efficient lightweight ciphers for internet of things.
KSII Transactions on Internet and Information Systems, 11(8),
secure the data generated by IoT device. Table 1 shows the 4006-4024. https://doi.org/10.3837/tiis.2017.08.014
comparison of lightweight security algorithms in IoT. The [11] Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A.
comparison shows that when we use only cryptography tech- (2017). SIT: A Lightweight Encryption Algorithm for Secure Inter-
net of Things, 8(1). https://doi.org/10.14569/IJACSA.2017.080151
nique to secure the data generated by IoT devices, we achieved [12] Kumar, M., Kumar, S., Budhiraja, R., Das, M. K., & Singh, S.
Data Integrity. It also shows that we can achieve Confidently, (2017). Lightweight Data Security Model for IoT Applications: A
Data Integrity and Authentication with the use of a combina- Dynamic Key Approach. Proceedings - 2016 IEEE International
Conference on Internet of Things; IEEE Green Computing and
tion of cryptography and steganography techniques to secure Communications; IEEE Cyber, Physical, and Social Computing;
the data generated by IoT devices. steganography used to IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016,
(3), 424-428. https://doi.org/10.1109/iThings-GreenCom-CPSCom-
hide the data into a carrier file, image, audio file or video file. SmartData.2016.100
So that, an intruder cannot sense the data generated by IoT [13] Patil, J., Bansod, G., & Kant, K. S. "LiCi: A new ultra-lightweight
devices, while traveling over the internet. block cipher," in 2017 International Conference on Emerging
Trends & Innovation in ICT (ICEI), feb 2017, pp. 40-45.
[14] Das, R., & Das, I. (2017). Secure data transfer in IoT
5 CONCLUSION environment: Adopting both cryptography and steganogra-
phy techniques. Proceedings - 2016 2nd IEEE Interna-
In the last few years, a new emerging domain IoT, attract tional Conference on Research in Computational Intelli-
the interest of researchers. Ans the use of internet also in- gence and Communication Networks, ICRCICN 2016, 296-301.
https://doi.org/10.1109/ICRCICN.2016.7813674
creases rapidly from the last few years. The security of data [15] Echandouri, B., Hanin, C., Omary, F., & Elbernoussi, S. (n.d.).
is a big challenge for computer users. Two main techniques LCAHASH-MAC : A New lightweight Message Authentication code
Using Cellular Automata for RFID. nov 2017, pp. 287-298.
are used for securing the data, Cryptography and Steganog- [16] Bapat, C., Baleri, G., B, S. I., & Nimkar, A. V. (2017). Smart-Lock
raphy. Cryptography is used for data security/encryption Security Re-engineered Using Cryptography and Steganography,
A Review of Data Security and Cryptographic Techniques in IoT based devices ICFNDS’18, June 26–27, 2018, Amman, Jordan

Security in Computing and Communications, 325-336.


[17] Jang, S., Lim, D., Kang, J., & Joe, I. (2016). An Efficient Device
Authentication Protocol Without Certification Authority for Inter-
net of Things. Wireless Personal Communications, 91(4), 1681-1695.
https://doi.org/10.1007/s11277-016-3355-0
[18] Aljawarneh, S., Yassein, M. B., & Talafha, W. A. (2017).
A resource-efficient encryption algorithm for multimedia big
data. Multimedia Tools and Applications, 76(21), 22703-22724.
https://doi.org/10.1007/s11042-016-4333-y
[19] Indrayani, R., Nugroho, H. A., Hidayat, R., & Pratama, I. (2017).
Increasing the security of MP3 steganography using AES Encryp-
tion and MD5 hash function. Proceedings - 2016 2nd International
Conference on Science and Technology-Computer, ICST 2016, 129-
132. https://doi.org/10.1109/ICSTC.2016.7877361
[20] V, M. B., Manimegalai, M., & Sinduja, V. (2013). Enhancement of
Image Security with New Methods of Cryptography and Steganog-
raphy, 9(9), 59-64.
[21] Patel, N., & Meena, S. (n.d.). LSB Based Image Steganography
Using Dynamic Key Cryptography. 2016 International Conference
on Emerging Trends in Communication Technologies (ETCT),
[22] Sarvabhatla, M., Chandra, M. R. M., & Vorugunti, C. S. (2015).
A secure and light weight authentication service in hadoop
using one time pad. Procedia Computer Science, 50, 81-86.
https://doi.org/10.1016/j.procs.2015.04.064

You might also like