Skip to main content
Log in

Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) deploys a wide range of technologies including wireless sensor networks, machine-to-machine communication, robots, internet technologies, and smart devices. IoT is a novel phenomenon in the IT world wherein objects can transmit data, and interact through the internet or intranet networks. But the most important and crucial issue on the IoT is privacy and data security. The objective of this paper is to create a new encryption model for data storage servers in an IoT-based irrigation systems. Thus, a hybrid encryption algorithm based on Elliptic Curve Cryptography (ECC), RC4, and SHA-256 is proposed to protect sensitive data of IoT-based irrigation systems. The proposed model uses ECC to improve RC4. In RC4, XOR operation is performed using a key encrypted by ECC and shift-right, and then the resulting data are transformed to SHA-256 to ensure security. Simulation results indicate that encryption and decryption time in the proposed model are shorter than other models like XXTEA & ECC, XXTEA & RSA, ECC&3DES&SHA-256, RC4&3DES&SHA-256, AES&RC4&SHA-256, AES&3DES &SHA-256, RC4&AES&SHA-256, RC2&3DES&SHA-256, and ECC&RC2&SHA-256 with, 43.39%, 66.03%, 45.28%, 54.71%, 50.94%, 33.96%, 33.62%, 24.52%, and, 15.09% respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Lyu, Y., & Yin, P. (2020). Internet of Things transmission and network reliability in complex environment. Computer Communications, 150, 757–763.

    Article  Google Scholar 

  2. Jazebi, S. J., & Ghaffari, A. (2020). RISA: routing scheme for Internet of Things using shuffled frog leaping optimization algorithm. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-01708-6.

    Article  Google Scholar 

  3. Nord, J. H., Koohang, A., & Paliszkiewicz, J. (2019). The internet of things: review and theoretical framework. Expert Systems with Applications, 133, 97–108.

    Article  Google Scholar 

  4. Hou, J., Qu, L., & Shi, W. (2019). A survey on internet of things security from data perspectives. Computer Networks, 148, 295–306.

    Article  Google Scholar 

  5. Dibaei, M., & Ghaffari, A. (2017). TSIS: a trust-based scheme for increasing security in wireless sensor networks. Majlesi Journal of Electrical Engineering, 11(4), 45–52.

    Google Scholar 

  6. Geetha, R., Suntheya, A. K., & Srikanth, G. U. (2020). Cloud integrated IoT enabled sensor network security: research issues and solutions. Wireless Personal Communications, 113, 747–771.

    Article  Google Scholar 

  7. Nawandar, N. K., & Satpute, V. R. (2019). IoT based low cost and intelligent module for smart irrigation system. Computers and Electronics in Agriculture, 162, 979–990.

    Article  Google Scholar 

  8. Subramani, C., et al. (2020). IoT-based smart irrigation system. Cognitive Informatics and Soft Computing, pp. 357–363.

  9. Dasgupta, A., et al. (2019) Smart irrigation: IOT-based irrigation monitoring system. In: Proceedings of international ethical hacking conference 2018. Singapore: Springer.

  10. Nayak, P., Kavitha, K., & Mallikarjuna, C. (2020). Rao, IoT-enabled agricultural system applications, challenges and security issues. In P. K. Pattnaik, et al. (Eds.), IoT and analytics for agriculture (pp. 139–163). Singapore: Springer.

    Chapter  Google Scholar 

  11. Beheshtiasl, A., & Ghaffari, A. (2019). Secure and Trust-Aware Routing Scheme In Wireless Sensor Networks. Wireless Personal Communications, 107(4), 1799–1814.

    Article  Google Scholar 

  12. Kodali, R. K., Yerroju, S., & Sahu, S. (2018). Smart farm monitoring using LoRa enabled IoT. In: 2018 second international conference on green computing and internet of things (ICGCIoT).

  13. Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2), 365–376.

    Article  Google Scholar 

  14. Tyagi, A.K., et al. (2020). A review on security and privacy issues in internet of things. In: Advances in computing and intelligent systems. Singapore: Springer.

  15. Sobin, C. C. (2020). A survey on architecture, protocols and challenges in iot. Wireless Personal Communications, 112(3), 1383–1429.

    Article  Google Scholar 

  16. Sharma, A., & Sharma, R. (2019). A review of applications, approaches, and challenges in internet of things (IoT). Proceedings of ICRIC, 2019, 257–269.

    Google Scholar 

  17. Gnauer, C., et al. (2019). Towards a secure and self-adapting smart indoor farming framework. e & i Elektrotechnik und Informationstechnik, 136(7), 341–344.

    Article  Google Scholar 

  18. Stinson, D. R. (1995). Cryptography: Theory and practice (2005th ed.). Boca Raton: CRC Press.

    MATH  Google Scholar 

  19. Miller, V.S. (1986). Use of elliptic curves in cryptography. In: Advances in cryptologyCRYPTO’85 proceedings. Berlin: Springer.

  20. Yoshida, H., & Biryukov, A. (2006). Analysis of a SHA-256 Variant. In: Selected Areas in Cryptography. Berlin: Springer.

  21. Gilbert, H., & Handschuh, H. (2004). Security analysis of SHA-256 and sisters. In: Selected Areas in Cryptography. Berlin: Springer.

  22. Pramudita, R., Hariadi, F.I., & Achmad, A.S. (2017). Development of IoT authentication mechanisms for microgrid applications. In: 2017 International Symposium on Electronics and Smart Devices (ISESD).

  23. Jung, M.Y., & Jang, J.W. (2017). Data management and searching system and method to provide increased security for IoT platform. In: 2017 International conference on information and communication technology convergence (ICTC).

  24. Shi, L., et al. (2019). Research of lightweight encryption algorithm based on AES and chaotic sequences for narrow-band internet of things. In: Machine learning and intelligent communications. Cham: Springer.

  25. Durairaj, M., & Muthuramalingam, K. (2019). A Lightweight multi-level encryption model for IoT applications. In A. E. Hassanien & M. Elhoseny (Eds.), Cybersecurity and secure information systems: Challenges and solutions in smart environments (pp. 17–29). Cham: Springer.

    Chapter  Google Scholar 

  26. Ziegler, D., Sabongui, J., & Palfinger, G. (2019). Fine-grained access control in industrial internet of things. In: ICT systems security and privacy protection. Cham: Springer.

  27. Chandu, Y., et al. (2017). Design and implementation of hybrid encryption for security of IOT data. In: 2017 international conference on smart technologies for smart nation (SmartTechCon).

  28. Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463–494.

    Article  Google Scholar 

  29. Abinaya, E., et al. (2018). A performance aware security framework to avoid software attacks on internet of things (IOT) based patient monitoring system. In: 2018 international conference on current trends towards converging technologies (ICCTCT).

  30. Huang, Q., Yang, Y., & Wang, L. (2017). Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access, 5, 12941–12950.

    Article  Google Scholar 

  31. Adiono, T., et al. (2018). Design of smart home mobile application with high security and automatic features. In: 2018 3rd international conference on intelligent green building and smart grid (IGBSG).

  32. Mao, J., et al. (2018). RSA-based handshake protocol in internet of things. In: 2018 9th international conference on information technology in medicine and education (ITME).

  33. Darwish, A., El-Gendy, M. M., & Hassanien, A. E. (2017). A new hybrid cryptosystem for internet of things applications. In A. E. Hassanien, et al. (Eds.), Multimedia forensics and security: Foundations, innovations, and applications (pp. 365–380). Cham: Springer.

    Chapter  Google Scholar 

  34. Thirumalai, C., & Viswanathan, P. (2018). Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services. Service Oriented Computing and Applications, 12(3), 285–294.

    Article  Google Scholar 

  35. Safkhani, M., & Bagheri, N. (2017). Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things. The Journal of Supercomputing, 73(8), 3579–3585.

    Article  Google Scholar 

  36. Schmitt, C., et al. (2017). Two-way authentication for the internet-of-things. In D. P. Acharjya & M. K. Geetha (Eds.), Internet of things: Novel advances and envisioned applications (pp. 27–56). Cham: Springer.

    Chapter  Google Scholar 

  37. Yang, X.-B., Chen, Y.-P., & Xiao, Y.-L. (2018). An improved scheme of secure access and detection of cloud front-end device. In: Proceedings of the Fourth Euro-China conference on intelligent data analysis and applications. Cham: Springer.

  38. Al-Ghaili, A. M., et al. (2019). A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. In V. E. Balas, et al. (Eds.), Internet of things and big data analytics for smart generation (pp. 77–103). Cham: Springer.

    Chapter  Google Scholar 

  39. Petrvalsky, M., & Drutarovsky, M. (2016). Constant-weight coding based software implementation of DPA countermeasure in embedded microcontroller. Microprocessors and Microsystems, 47, 82–89.

    Article  Google Scholar 

  40. Aerabi, E., et al. (2020). Design space exploration for ultra-low-energy and secure IoT MCUs. ACM Transactions on Embedded Computing Systems (TECS), 19(3), 1–34.

    Article  Google Scholar 

  41. Weerasinghe, T.D.B. (2013). An effective RC4 stream cipher. In: 2013 IEEE 8th international conference on industrial and information systems.

  42. Lohachab, A., & Karambir, B. (2018). Critical analysis of DDoS—An emerging security threat over IoT networks. Journal of Communications and Information Networks, 3(3), 57–78.

    Article  Google Scholar 

  43. Ragab, A.A.M., et al. (2020). Hybrid cryptosystems for protecting IoT smart devices with comparative analysis and evaluation. In: Proceedings of the future technologies conference (FTC) 2019. Cham: Springer.

  44. Ragab, A., et al. (2019) Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: Security, privacy, and anonymity in computation, communication, and storage. Cham: Springer.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Ghaffari.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mousavi, S.K., Ghaffari, A., Besharat, S. et al. Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems). Wireless Pers Commun 116, 1713–1742 (2021). https://doi.org/10.1007/s11277-020-07758-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07758-5

Keywords

Navigation