Volume 13 , Issue 2 , PP: 84-95, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Sanaa Ahmed Kadhim 1 * , Ruwaida Mohammed Yas 2 , Saad A. A. Abdual Rahman 3
Doi: https://doi.org/10.54216/JCIM.130207
In today's mass communication landscape, security is a paramount concern, notably with the rapid expansion of the Internet of Things (IoT). Various methods aim to bolster IoT communication security, particularly by regulating access between IoT devices and networks. Encrypting data with a shared secret key is crucial, considering the limited capabilities of these devices, demanding a lightweight yet robust control mechanism. While traditional methods like Diffie-Hellman facilitated secure communication, vulnerabilities arose from modular and exponential equations. Our paper proposed a mathematical refinement of the Diffie Hellman (D_H) protocol. By leveraging GF finite fields and multi-order recursive sequences, this enhanced method aims to fortify confidentiality and complexity in exchanged keys, enabling secure data transmission while remaining efficient for resource restricted IoT devices. Validation using the Affine encryption method demonstrates considerable improvements in complexity, security, and speed. Incorporating Galois field (GF) and third-order sequencing enhances secrecy and complexity, ensuring swift computational processes.
IoT security , Secret Key Exchange , Finite field (GF) , Recursive sequence , D_H protocol, Recursive sequences , Symmetric encryption , Confidentiality , Secure data transmission , Computational efficiency
[1] R. Meng, Z. Zhou, Q. Cui, X. Sun and C. Yuan, "A novel steganography scheme combining coverless information hiding and steganography," Journal of Information Hiding and Privacy Protection, vol. 1, no.1, pp. 43–48, 2019. https://www.techscience.com/jihpp/v1n1/28995.
[2] Sousa PR, Magalhães L, Resende JS, Martins R, Antunes L. Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE. Sensors (Basel). 2021 Sep 2;21(17):5898. doi: 10.3390/s21175898. PMID: 34502789; PMCID: PMC8433780. https://pubmed.ncbi.nlm.nih.gov/34502789/.
[3] R. O. Andrade, S. G. Yoo, L. Tello-Oquendo and I. Ortiz-Garcés, "A Comprehensive Study of the IoT Cybersecurity in Smart Cities," in IEEE Access, vol. 8, pp. 228922-228941, 2020, doi: 10.1109/ACCESS.2020.3046442. https://ieeexplore.ieee.org/document/9303356.
[4] Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu, "Authentication Protocols for Internet of Things: A Comprehensive Survey", Security and Communication Networks, vol. 2017, Article ID 6562953, 41 pages, 2017. https:// doi.org/ 10.1155/ 2017/6562953.
[5] A. A. Ayele and V. Sreenivasarao, “A Modified RSA Encryption Technique Based on Multiple public keys,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 4, Jun. 2013. https://dl.acm.org/doi/10.1504/IJISCM.2017.091269
[6] L. M. Adleman and M.-D. A. Huang, “Function Field Sieve Method for Discrete Logarithms over Finite Fields,” Information and Computation, vol. 151, no. 1–2, pp. 5–16, May 1999, doi: 10.1006/inco.1998.2761. https://www.sciencedirect.com/science/article/pii/S0890540198927614.
[7] S. Sitjongsataporn and P. Nurarak, A modified adaptive step-size affine projection algorithm based on QR-decomposition. International Electrical Engineering Congress (iEECON), Pattaya, Thailand, 2017. doi: 10.1109/ieecon.2017.8075870. https://ieeexplore.ieee.org/document/8075870.
[8] R. Meng, Z. Zhou, Q. Cui, X. Sun and C. Yuan, "A novel steganography scheme combining coverless information hiding and steganography," Journal of Information Hiding and Privacy Protection, vol. 1, no.1, pp. 43–48, 2019. https://ieeexplore.ieee.org/document/8731888.
[9] A. M. SRahma, A. A. Hossen, and O. Dawood, “Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem,” Engineering & Technology Journal, vol. 34, no. 1, pp. 1–15, Jan. 2016, doi: 10.30684/etj.34.1b.1. https://etj.uotechnology.edu.iq/article_112560.html.
[10] X. Meng, J. Xu, X. Wu and Z. Wang, "Design of a mutual authentication and key agreement protocol for wbans," Journal of Information Hiding and Privacy Protection, vol. 2, no.3, pp. 107–114, 2020. https://www.techscience.com/jihpp/v2n3/40849.
[11] S. Çalkavur, P. Solé, and A. Bonnecaze, “A New Secret Sharing Scheme Based on Polynomials over Finite Fields,” Mathematics, vol. 8, no. 8, p. 1200, Jul. 2020, doi: 10.3390/math8081200. https://www.mdpi.com/2227-7390/8/8/1200.
[12] G. Khachatrian and M. K. Kyureghyan, “Permutation polynomials and a new public-key encryption,” Discrete Applied Mathematics, vol. 216, pp. 622–626, Jan. 2017, doi: 10.1016/j.dam.2015.09.001.
[13] M. H. Afifi, L. Zhou, S. Chakrabartty and J. Ren, "Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things," in IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2927-2935, Aug. 2018, doi: 10.1109/JIOT.2017.2757918. https://profiles.wustl.edu/en/publications/dynamic-authentication-protocol-using-self-powered-timers-for-pas.
[14] S. Ahmed Kadhim and S. Abdual Azize abdual Rahman, “A proposed method for encrypting and sending confidential data using polynomials,” Global Journal of Engineering and Technology Advances, vol. 8, no. 2, pp. 082–087, 2021. https://gjeta.com/content/proposed-method-encrypting-and-sending-confidential-data-using-polynomials.
[15] R. Patgiri, “privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm”, IEEE TRANSACTIONS ON SERVICES COMPUTING, p 647, 2021. https://eprint.iacr.org/2021/647.pdf.
[16] M. Jha, Sh. Patil, “Advancement in Diffie-Hellman algorithm”, Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 5, Issue 7, pp.01-02, (Part - 4) July 2015. https://www.ijera.com/papers/Vol5_issue7/Part%20-%204/A57040102.pdf.
[17] R. M. Mohsin, R. I. Ahmed, Z. R. Hussein, “AN IMPROVED DIFFIE-HELLMAN PROTOCOL SECURITY USING VIDEO ENTROPY”, journal of southwest jiaotong university, Vol. 55 No. 6 Dec. 2020. http://www.jsju.org/index.php/journal/article/view/750.
[18] Gurshid, “Improvement of Diffie-Hellman Key Exchange Algorithm”, International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Volume 6 Issue 6, June 2017. https://www.ijsr.net/archive/v6i6/ART20174049.pdf.
[19] N. Aryan, C. Kumar, and P. M. D. R. Vincent, “Enhanced diffie-hellman algorithm for reliable key exchange,” IOP Conference Series: Materials Science and Engineering, vol. 263, p. 042015, Oct. 2017, doi: 10.1088/1757-899x/263/4/042015. http://repositorio.utn.edu.ec/bitstream/123456789/14603/2/04%20RED%20360%20TESIS.pdf.
[20] S. Lehtinen, “Diffie-Hellman Key Exchange: From Mathematics to Real Life”, LAP LAMBERT Academic Publishing, October 3, 2012. https://www.amazon.com/Diffie-Hellman-Key-Exchange-Mathematics-Real/dp/3659252476.
[21] B. Ansari, “Finite Field Arithmetic and its Application in Cryptography”, A dissertation for the degree of Doctor, University of California Los Angeles, 2012. https://escholarship.org/content/qt7gj7w5mz/qt7gj7w5mz.pdf?t=nflfta.
[22] S. Xi, J. Zhengtao, T. Lei, and W. Yu-Min, “Further research on public-key cryptosystems based on third-order recurrence sequence,” Frontiers of Electrical and Electronic Engineering in China, Sep. 2006, doi: 10.1007/s11460-006-0039-7. https://link.springer.com/article/10.1007/s11460-006-0039-7.
[23] M. Kazemi, H. Naraghi, and H. M. Golshan, “On the Affine Ciphers in Cryptography,” in Springer eBooks, 2011, pp. 185–199. doi: 10.1007/978-3-642-25327-0_17. https://link.springer.com/chapter/10.1007/978-3-642-25327-0_17.
[24] W. A. Shukur, A. Badrulddin, M. K. Nsaif, “A proposed encryption technique of different texts using circular link lists”, Periodicals of Engineering and Natural Sciences (PEN), Vol. 9, No. 2, June 2021, pp.1115-1123, doi: 10.21533/pen.v9i2.2096. http://pen.ius.edu.ba/index.php/pen/article/view/2096.
[25] A. K. Al-Swidi, E. H. Al-Saadi, and L. H. Al-Saadi, “Soft public key cipher,” Periodicals of Engineering and Natural Sciences (PEN), vol. 7, no. 3, p. 1433, Oct. 2019, doi: 10.21533/pen.v7i3.786. http://pen.ius.edu.ba/index.php/pen/article/view/786.
[26] Kadhim, S.A., Yas, R.M., Rahman, S.A.A.A., Abd, S.K., “developing a new encryption algorithm for images transmitted through wsn systems”, Eastern-European Journal of Enterprise Technologiesthis link is disabled, 2023, 4(9(124)), pp. 54–60. https://www.oceancitylibrary.org/eds/detail?db=asr&an=172294937.
[27] Darch Abed Dawar, A. (2024). Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks. International Journal of Mathematics, Statistics, and Computer Science, 2, 183–198. https://doi.org/10.59543/ijmscs.v2i.9073