Secure and Optimized Communication in the Internet of Things using DNA Cryptography with X.509 Digital Attributes

Secure and Optimized Communication in the Internet of Things using DNA Cryptography with X.509 Digital Attributes

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-3
Year of Publication : 2023
Author : S. Karthikeyan, T. Poongodi
DOI : 10.14445/22315381/IJETT-V71I3P201

How to Cite?

S. Karthikeyan, T. Poongodi, "Secure and Optimized Communication in the Internet of Things using DNA Cryptography with X.509 Digital Attributes," International Journal of Engineering Trends and Technology, vol. 71, no. 3, pp. 1-8, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I3P201

Abstract
The Internet of Things (IoT) is a large volume of physical entities that forms large interconnections between them and then connect with the internet to establish communication for improving the quality of human life. The exchange of data between these entities can lead to attacks or modifications of sensitive data. Hence, data authentication is regarded as a vital requirement to access the system for secured message transmission. The security of data is achieved by proper data authentication. Hence, in this paper, the major objective of the proposed system is to deliver secure and optimized communication in the Internet of Things using DNA cryptography with X.509 certificates, here by using X.509 digital certificates to produce attributes for key generation based on the data and DNA cryptography to secure the data, which hides the genetic information using a computational method to improve data privacy in DNA sequencing processes. Here the result gives DNA-X.509 gets a reduced key size after encoding using DNA-X.509 than the one with DNA and ECDSA algorithms. The application of attributed-based X.509 also improves the authentication ability of the data compared to the other methods. X.509 digital certificates and DNA cryptography to secure the data that hides the genetic information using a computational method for improving the data privacy in DNA sequencing processes .

Keywords
IoT, DNA Cryptography, Authentication, Privacy, X.509 Certificates, Cryptosystem, Authorization.

References
[1] Sanaz Nakhodchi, Aaruni Upadhyay, and Ali Dehghantanha, “A Comparison between Different Machine Learning Models for IoT Malware Detection,” Security of Cyber-Physical Systems, Springer, Cham, pp. 195-202, 2020. Google Scholar | CrossRef | Publisher Link
[2] Tejasvi Alladi et al., “Consumer IoT: Security Vulnerability Case Studies and Solutions,” IEEE Consumer Electronics Magazine, vol. 9, no. 2, pp. 17-25, 2020. Google Scholar | CrossRef | Publisher Link
[3] Henry K. H. Wang, Renewable Energy Management in Emerging Economies: Strategies for Growth, Routledge, 2020. Google Scholar | Publisher Link
[4] Marc Fossi et al., Symantec Internet Security Threat Report Trends for 2010, vol. 16, 2011. Google Scholar | Publisher Link
[5] Mohamed Ahzam Amanullah et al., “Deep Learning and Big Data Technologies for IoT Security,” Computer Communications, vol. 151, pp. 495-517, 2020. Google Scholar | CrossRef | Publisher Link
[6] Sachi Nandan Mohanty et al., “An Efficient Lightweight Integrated Blockchain (ELIB) Model for IoT Security and Privacy,” Future Generation Computer Systems, vol. 102, pp. 1027-1037, 2020. Google Scholar | CrossRef | Publisher Link
[7] Charles Wheelus, and Xingquan Zhu, “IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework,” IoT, vol. 1, no. 2, pp. 259-285, 2020. Google Scholar | CrossRef | Publisher Link
[8] Bhabendu Kumar Mohanta et al., “Survey on IoT Security: Challenges and Solution Using Machine Learning, Artificial Intelligence and Blockchain Technology,” Internet of Things, vol. 11, p. 100227, 2020. Google Scholar | CrossRef | Publisher Link
[9] Madhusanka Liyanage et al., IoT Security: Advances in Authentication, John Wiley & Sons, 2020. Google Scholar | Publisher Link
[10] José Roldán et al., “Integrating Complex Event Processing and Machine Learning: An Intelligent Architecture for Detecting IoT Security Attacks,” Expert Systems with Applications, vol. 149, p. 113251, 2020. Google Scholar | CrossRef | Publisher Link
[11] Rasheed Ahmad, and Izzat Alsmadi, “Machine Learning Approaches to IoT Security: A Systematic Literature Review,” Internet of Things, 100365, 2021. Google Scholar | CrossRef | Publisher Link
[12] Omnia Abu Waraga et al., “Design and Implementation of Automated IoT Security Testbed,” Computers & Security, vol. 88, p. 101648, 2020. Google Scholar | CrossRef | Publisher Link
[13] Mohammed Ali Al-Garadi et al., “A Survey of Machine and Deep Learning Methods for Internet of Things (Iot) Security,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, 2020. Google Scholar | CrossRef | Publisher Link
[14] Fatima Hussain et al., “Machine Learning in IoT Security: Current Solutions and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686-1721, 2020. Google Scholar | CrossRef | Publisher Link
[15] Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan, and andIan McAndrew, “Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN),” Computers, vol. 9, no. 1, p. 8, 2020. Google Scholar | CrossRef | Publisher Link
[16] Hichem Mrabet et al., “A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis,” Sensors, vol. 20, no. 13, p. 3625, 2020. Google Scholar | CrossRef | Publisher Link
[17] Lerina Aversano et al., “A Systematic Review on Deep Learning Approaches for IoT Security,” Computer Science Review, vol. 40, p. 100389, 2021. Google Scholar | CrossRef | Publisher Link
[18] Chandrasegar Thirumalai, Senthilkumar Mohan, and Gautam Srivastava, “An Efficient Public Key Secure Scheme for Cloud and IoT Security,” Computer Communications, vol. 150, pp. 634-643, 2020. Google Scholar | CrossRef | Publisher Link
[19] Shahid Mahmood, Amin Ullah, and Anas Khalid Kayani, “Fog Computing Trust based Architecture for Internet of Things Devices,” International Journal of Computing and Communication Networks, vol. 1, no. 1, pp. 18-25, 2019. Google Scholar | Publisher Link
[20] Pramod Pavithran et al., “A Novel Cryptosystem Based on DNA Cryptography and Randomly Generated Mealy Machine,” Computers & Security, vol. 104, p. 102160, 2021. Google Scholar | CrossRef | Publisher Link
[21] Prema T. Akkasaligar, and Sumangala Biradar, “Selective Medical Image Encryption Using DNA Cryptography,” Information Security Journal: A Global Perspective, vol. 29, no. 2, pp. 91-101, 2020. Google Scholar | CrossRef | Publisher Link
[22] Anupam Das, Shikhar Kumar Sarma, and Shrutimala Deka, “Data Security with DNA Cryptography,” Transactions on Engineering Technologies, Springer, Singapore, pp. 159-173, 2021. Google Scholar | CrossRef | Publisher Link
[23] Khaled Salah Mohamed, “New Trends in Cryptography: Quantum, Blockchain, Lightweight, Chaotic, and DNA Cryptography,” New Frontiers in Cryptography, Springer, Cham, pp. 65-87, 2020. Google Scholar | CrossRef | Publisher Link
[24] Andrea Ceccanti, Enrico Vianello, and Francesco Giacomini, “Beyond X. 509: Token-Based Authentication and Authorization in Practice,” EPJ Web of Conferences, EDP Sciences, vol. 245, p. 03021, 2020. Google Scholar | CrossRef | Publisher Link
[25] Jiaxin Li, Zhaoxin Zhang, and Changyong Guo, “Machine Learning-Based Malicious X.509 Certificates’ Detection,” Applied Sciences, vol. 11, no. 5, p. 2164, 2021. Google Scholar | CrossRef | Publisher Link
[26] Naser Peiravian, and Xingquan Zhu, “Machine Learning for Android Malware Detection Using Permission and API Calls,” 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, IEEE, pp. 300-305, 2013. Google Scholar | CrossRef | Publisher Link
[27] Mukrimah Nawir et al., “Internet of Things (IoT): Taxonomy of Security Attacks,” 2016 3rd International Conference on Electronic Design (ICED), IEEE, pp. 321-326, 2016. Google Scholar | CrossRef | Publisher Link
[28] S. Durga, Rishabh Nag, and Esther Daniel, “Survey on Machine Learning and Deep Learning Algorithms Used in Internet of Things (Iot) Healthcare,” 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), IEEE, pp. 1018-1022, 2019. Google Scholar | CrossRef | Publisher Link
[29] Jyoti Kansari, Avinash Dhole, and Yogesh Rathore, "A Survey on Block Cipher and Chaotic Based Encryption Techniques," International Journal of Computer Trends and Technology, vol. 69, no. 3, pp. 52-59, 2021. CrossRef | Publisher Link
[30] Yair Meidan et al., “Detection of Unauthorized IoT Devices Using Machine Learning Techniques,” arXiv preprint arXiv:1709.04647, 2016. Google Scholar | CrossRef | Publisher Link
[31] Rohan Doshi, Noah Apthorpe, and Nick Feamster, “Machine Learning DDos Detection for Consumer Internet of Things Devices,” 2018 IEEE Security and Privacy Workshops (SPW), IEEE, pp. 29-35, 2018. Google Scholar | CrossRef | Publisher Link
[32] Markus Miettinen et al., “IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT,” 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp. 2177-2184, 2017. Google Scholar | CrossRef | Publisher Link
[33] Robert Moskovitch et al., “Improving the Detection of Unknown Computer Worms Activity Using Active Learning,” Annual Conference on Artificial Intelligence, Springer, Berlin, Heidelberg, pp. 489-493, 2007. Google Scholar | CrossRef | Publisher Link
[34] Ivana Damgård et al., “Fast Threshold ECDSA with Honest Majority,” International Conference on Security and Cryptography for Networks, Springer, Cham, pp. 382-400, 2020. Google Scholar | CrossRef | Publisher Link
[35] Huiyi Han, Zhiyi Qu, and Weiwei Kang, "A Login Strategy using Fingerprint Verification," SSRG International Journal of Computer Science and Engineering, vol. 2, no. 7, pp. 35-39, 2015. CrossRef | Publisher Link
[36] Hiran V. Nath, and Babu M. Mehtre, “Static Malware Analysis Using Machine Learning Methods,” International Conference on Security in Computer Networks and Distributed Systems, Springer, Berlin, Heidelberg, pp. 440-450, 2014. Google Scholar | CrossRef | Publisher Link
[37] Vikas Hassija et al., “A Survey on Iot Security: Application Areas, Security Threats, and Solution Architectures,” IEEE Access, vol. 7, pp. 82721-82743, 2019. Google Scholar | CrossRef | Publisher Link
[38] Kawtar Bouzoubaa, Youssef Taher, and Benayad Nsiri, “DOS-DDOS Attacks Predicting: Performance Comparison of the Main Feature Selection Strategies,” International Journal of Engineering Trends and Technology, vol. 70, no. 1, pp. 299-312, 2022. Google Scholar | CrossRef | Publisher Link
[39] Enrique Lee Huamaní et al., “Design of an IoT Prototype for the Prevention of Robberies in the Young Areas of Lima,” International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 111-118, 2022. Google Scholar | CrossRef | Publisher Link
[40] N. Krishnaraj, and S. Sangeetha, “A Study of Data Privacy in Internet of Things Using Privacy Preserving Techniques with its Management,” International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 54-65, 2022. Google Scholar | CrossRef | Publisher Link
[41] Suyel Namasudra, “A Secure Cryptosystem Using DNA Cryptography and DNA Steganography for the Cloud-Based IoT Infrastructure,” Computers and Electrical Engineering, vol. 104, p. 108426, 2022. Google Scholar | CrossRef | Publisher Link
[42] Pratyusa Mukherjee et al., “Emerging DNA Cryptography-Based Encryption Schemes: A Review,” International Journal of Information and Computer Security, vol. 20, no. 1-2, pp. 27-47, 2023. Google Scholar | CrossRef | Publisher Link
[43] M. Indrasena Reddy, A.P. Siva Kumar, and K. Subba Reddy, “A Secured Cryptographic System Based on DNA and a Hybrid Key Generation Approach,” Biosystems, vol. 197, p. 104207, 2020. Google Scholar | CrossRef | Publisher Link
[44] Lalit Mohan Gupta, Hitendra Garg, and Abdus Samad, “A Secure Data Transfer Approach with an Efficient Key Management Over Cloud,” International Journal of Information Technology and Web Engineering (IJITWE), vol. 17, no. 1, pp. 1-21, 2022. Google Scholar | CrossRef | Publisher Link
[45] CH.Jayanthi, and V.Srinivas, "Mathematical Modelling for Cryptography using Laplace Transform," International Journal of Mathematics Trends and Technology, vol. 65, no. 2, pp. 10-15, 2019. Google Scholar | CrossRef | Publisher Link
[46] Liang Xiao et al., “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?,” IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, 2018. Google Scholar | CrossRef | Publisher Link
[47] Stanislav Ponomarev, and Travis Atkison, “Industrial Control System Network Intrusion Detection by Telemetry Analysis,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 252-260, 2015. Google Scholar | CrossRef | Publisher Link