Abstract

Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. During the data exchange, it is mandatory to secure the messages between sender and receiver to handle the malicious human based attacks. The main problem during Fingerprint based approaches is the computational overhead due to large real numbers required for Fingerprint and verification processes. This paper presents a light weight Shortened Complex Digital Fingerprint Algorithm (SCDSA) for providing secure communication between smart devices in human centered IoT. We have used less extensive operations to achieve Fingerprint and verification processes like human beings do Fingerprints on legal documents and verify later as per witness. It enhances the security strength to guard against traffic analysis attacks.

Keywords

Confidentiality, Complex Numbers, Digital Fingerprint, Internet of Things,

Downloads

Download data is not yet available.

References

  1. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao ,“A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications”, IEEE Internet of Things Journal, Vol. 4 No. 5, pp. 1125-1142, 2017.
  2. X. Luo, J. Liu, D. Zhang, and X. Chang, “A large-scale web QoS prediction scheme for the industrial Internet of Things based on a kernel machine learning algorithm,” Computer Networks, Vol. 101, pp. 81-89, 2016.
  3. W. Zhao, R. Lun, C. Gordon, A. M. Fofana, D. D. Espy ,A. Reinthal, B. Ekelman, G. D. Goodman, J. E. Niederriter, and X. Luo, “A human-centered activity tracking service: Towards a healthier workplace,” IEEE Transactions on Human-Machine Systems, Vol. 47, No.3, pp. 343-355, 2017.
  4. H. Lin, T. Zong, and Y. Yeh, “A DL Based Short strong Designated Verifier Fingerprint Scheme with Low Computation” Journal of Information Science and Engineering, Vol. 27, pp. 451-463, 2011.
  5. Andrew Chi-Chih Yao ; Yunlei Zhao,” Online based Fingerprints for Low-Power Devices”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 2, pp. 283-294, 2013.
  6. Z. Shao, “Digital Fingerprint schemes based on factoring and discrete logarithms”, Electronic Letters, pp.1518-1519, 2002
  7. X. Luo, D. Zhang, L. T. Yang, J. Liu, X. Chang, and H. Ning, “A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems”, Future Generation Compute rSystems, Vol. 61, pp. 85-96, 2016
  8. M. Mossinger, B. Petschkuhn, J. Bauer, R. C.Staudemeyer, M. Wojcik and H. C. Pohls, “Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC Fingerprints on an ARM-based device”, in Proceedings of International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2016, pp. 1-6.
  9. X. Luo, J. Deng, J. Liu, W. Wang, X. Ban, and J. H. Wang, “A quantized kernel least mean square scheme with entropy-guided learning for intelligent data analysis”, China Communications, Vol. 14, No. 7, pp. 127-136, 2017
  10. Y. Xu, X. Luo, W. Wang, and W. Zhao, “Efficient DV-HOP localization for wireless cyber-physical social sensing system: A correntropy-based neural network learning scheme”, Sensors, Vol. 17, No. 1, Id. 135, 2017
  11. H. C. Pohls, “JSON Sensor Fingerprints (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application”, in Proceedings of International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015, pp. 306-312.
  12. X. Luo, Y. Xu, W. Wang, M. Yuan, X. Ban, Y. Zhu, and W. Zhao, “Towards enhancing stacked extreme learning machine with sparse auto encoder by correntropy”, Journal of The Franklin Institute, Vol. 355, No. 4, pp.1945-1966, 2018
  13. S. Zeng, C. Yang and M. Hwang, “A new digital Fingerprint scheme based on Factoring and Discrete Logarithm”, International Journal of Computer Mathematics, pp. 9-14, 2004.