A Review of Hash Function Types and their Applications
DOI:
https://doi.org/10.31185/wjcm.52Keywords:
Cryptography, Wireless Security, Network Security, Internet of Things, Defense Security, IOTAbstract
In the recent decade, global community has been one of the world's most prominent targets of terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however the security forces and law enforcement agencies are creating and launching high security weaponry to secure their territories. There is a huge necessity to include the greater level of protection into military vehicles in the wake of several terrorist attacks and sniffing of security officers. Terrorists rely heavily on infiltration while avoiding detection by security measures because of the holes in these hypothetical situations. This paper presents the central methods of hash functions, cryptography and dynamic encryption that may be utilised by the military personnel to increase the safety, privacy, and resistance to sniffing of their communications with one another. This article details the many methods and algorithms that may be included into laser guided defensive weapons and vehicles to provide safe communication across the system.
References
M. Ma, D. He, N. Kumar, K. K. Choo, and J. Chen, “Certificate-less searchable public key encryption scheme for industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 759–67, 2018.
P. H. Minatel, S. H. Lee, and B. S. Pinto, “Boeira FC, inventors; Samsung Electronica da Amazonia Ltda, assignee. Method for Verifying
Authenticity, Configuring Network Credentials and Cryptographic Keys for Internet Of Things (IoT) Devices Using Near Field Communication (NFC),” 2018.
R. Chaudhary, A. Jindal, G. S. Aujla, N. Kumar, A. K. Das, and N. Saxena LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Communications Magazine, vol. 56, pp. 24–32, 2018.
D. M. Trivedi and T. J. Raval, “Proposed Cryptographic Approach for Securing IOT Device,” 2018.
A. S. Sani, D. Yuan, P. L. Yeoh, W. Bao, S. Chen, and B. Vucetic, “A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications,” In2018 IEEE International Conference on Communications (ICC), pp. 1–6, 2018.
J. Shen, T. Zhou, F. Wei, X. Sun, and Y. Xiang, “Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2526–2562, 2018.
Q. Han, Y. Zhang, and H. Li Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Generation Computer Systems, vol. 83, pp. 269–77, 2018.
U. Banerjee, C. Juvekar, A. Wright, and A. P. Chandrakasan, “An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications,” InSolid-State Circuits Conference-(ISSCC), pp. 42–44, 2018. IEEE.
C. Thirumalai and H. Kar Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices. InPower and Advanced Computing Technologies (i-PACT, pp. 1–6, 2017. IEEE.
Q. Huang, Y. Yang, and L. Wang, “Secure data access control with Cipher-Text update and computation outsourcing in fog computing for Internet of Things,” IEEE Access, vol. 5, pp. 12941–50, 2017.
S. Challa, M. Wazid, A. K. Das, N. Kumar, A. G. Reddy, E. J. Yoon, and K. Y. Yoo, “Secure signature-based authenticated key establishment scheme for future IoT applications,” IEEE Access, vol. 5, pp. 3028–3071, 2017.
Z. Liu, J. Großschädl, Z. Hu, K. Järvinen, H. Wang, and I. Verbauwhede, “Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 773–85, 2017.
M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “Sit: A lightweight encryption algorithm for secure internet of things,” 2017.
Q. Jiang, S. Zeadally, J. Ma, and D. He, “Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks,” IEEE Access, vol. 5, pp. 3376–92, 2017.
A. A. Diro, N. Chilamkurti, and N. Kumar Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mobile Networks and Applications, vol. 22, pp. 848–58, 2017.
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, “A synchronized shared key generation method for maintaining end-to-end security of big data streams.”
M. S. Farash, M. Turkanovic, S. Kumari, and M. Hölbl ´ An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, vol. 36, pp. 152–76, 2016.
S. Raza, L. Seitz, D. Sitenkov, and G. Selander, “S3K: scalable security with symmetric keys-DTLS key establishment for the Internet of things,” IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp. 1270–80, 2016.
X. Huang, P. Craig, H. Lin, and Z. Yan SecIoT: a security framework for the Internet of Things. Security and communication networks, vol. 9, pp. 3083–94, 2016.
A. Ouaddah, A. A. Elkalam, A. Ouahman, and A FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and Communication Networks, vol. 9, pp. 5943–64, 2016.
H. Kim, A. Wasicek, B. Mehne, and E. A. Lee, “A secure network architecture for the internet of Things based on local authorization entities. InFuture Internet of Things and Cloud (FiCloud),” IEEE 4th International Conference on, pp. 114–122, 2016.
J. L. Hernández-Ramos, A. J. Jara, L. Marín, S. Gómez, and A. F, “DCapBAC: embedding authorization logic into smart things through ECC optimizations,” International Journal of Computer Mathematics, vol. 93, no. 2, pp. 345–66, 2016.
G. C. Bae and K. W. Shin, “An efficient hardware implementation of lightweight block cipher algorithm CLEFIA for IoT security applications,” Journal of the Korea Institute of Information and Communication Engineering, vol. 20, no. 2, pp. 351–359, 2016.
K. Mahmood, S. A. Chaudhry, H. Naqvi, T. Shon, and H. F. Ahmad, “A lightweight message authentication scheme for Smart Grid communications in power sector,” Computers & Electrical Engineering, vol. 52, pp. 114–138, 2016.
M. Vucini ˇ c, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and G. R. Oscar ´ Object security architecture for the Internet of Things. Ad Hoc Networks, vol. 32, pp. 3–16, 2015.
V. L. Shivraj, M. A. Rajan, M. Singh, and P. Balamuralidhar, “One time password authentication scheme based on elliptic curves for Internet of Things (IoT),” InInformation Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, pp. 1–6, 2015.
L. Marin, M. P. Pawlowski, and A. Jara Optimized ECC implementation for secure communication between heterogeneous IoT devices. Sensors, vol. 15, pp. 21478–99, 2015.
D. Dinu, L. Corre, Y. Khovratovich, D. Perrin, L. Großschädl, J. Biryukov, and A, “Triathlon of lightweight block ciphers for the internet of things,” Journal of Cryptographic Engineering, 1920.
R. Hummen, H. Shafagh, S. Raza, T. Voig, and K. Wehrle, “Delegation-based Authentication and Authorization for the IP-based Internet of Things. InSensing, Communication, and Networking (SECON),” Eleventh Annual IEEE International Conference on, pp. 284–292, 2014.
Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, vol. 64, pp. 273–95, 2014.
O. A. Hassen and H. Ibrahim, “Preventive Approach against HULK Attacks in Network Environment,” International Journal of Computing and Business Research, vol. 7, 2017.
P. N. Mahalle, N. R. Prasad, and R. Prasad, “Novel Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT).”
S. R. Moosavi, T. N. Gia, A. M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho, and H. Tenhunen, “SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science, vol. 52, pp. 452–461, 2015.
S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi, “Key management protocol with implicit certificates for IoT systems,” InProceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 37–42, 2015.
H. Shafagh, A. Hithnawi, A. Dröscher, S. Duquennoy, W. Hu, and Talos, “Encrypted query processing for the internet of things,” InProceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp. 197–210, 2015.
S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari Iot-oas: An oauth-based authorization service architecture for secure services in it scenarios. IEEE sensors journal, vol. 15, pp. 1224–1258, 2015.
H. Shafagh and A. Hithnawi, “Security comes first, a public-key cryptography framework for the internet of things,” 2014 IEEE International Conference on, pp. 135–136, 2014.
L. Touati, Y. Challal, A. Bouabdallah, and C-Cp-Abe Cooperative Cipher-Text policy attribute-based encryption for the internet of things. In Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on, pp. 64–69, 2014. IEEE.
K. N. Prasetyo, Y. Purwanto, and D. Darlis An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA. InInformation and Communication Technology (ICoICT), pp. 75–79, 2014. IEEE.
M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment. InTrust, Security and Privacy in Computing and Communications (TrustCom),” IEEE 13th International Conference on, pp. 205–211, 2014.
V. Lakkundi and K. Singh, “Lightweight DTLS implementation in CoAP-based Internet of Things,” InAdvanced Computing and Communications (ADCOM), pp. 7–11, 2014.
M. Neamah, “Fuzzy logic integrated security aware algorithm for vulnerability avoidance in network environment,” Journal of Advanced Research in Dynamical and Control Systems, vol. 10, pp. 785–794, 2018.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Haifaa Ahmed Hasan, Hassan F. Al-Layla, Farah N. Ibraheem
This work is licensed under a Creative Commons Attribution 4.0 International License.