SlideShare una empresa de Scribd logo
1 de 23
Internet of Things (IoT) Security
using stream cipher
Presentation outlines:
1. Abstract
2. Problem Definition
3. Definition IoT
4. IoT Platform, operating systems, development tools
5. Challenges in IoT
6. Key IoT Security Technology
7. Cryptography
8. One time pad
9. DNA
10. Hardware and Software tools
11. Implementation in Python (Encryption) & (Decryption)
12. MQTT Protocol
13. RASPBERRY PI
14. Case Study
Abstract
Internet of Things (IoT) is a rapid technology that enables devices to
communicate and share information between them. It consists of things
"devices" with ability of internet connectivity and networking. Due to increasing
needs of secure environment in IoT application, the security is becoming an
attractive field for the researchers. Connecting devices to the internet will
facilitate the hackers attack since they can reach the data from anywhere in the
globe. The weaknesses in security causes serious economic and privacy loss . In
this work, an encryption-decryption process based stream cipher has been used.
The messages between IoT nodes (Raspberry Pi) is encrypted using linear
feedback shift register as a pseudo number key generator for one time pad
stream cipher, along with a DNA computing. A vihcle network would be taken as
a case study for this work.
Problem Definition
IoT security is the technology area concerned with safeguarding connected
devices and networks in the internet of things (IoT). IoT security has become the
subject of scrutiny after a number of high-profile incidents where a common IoT
device was used to infiltrate and attack the larger network. Implementing security
measures is critical to ensuring the safety of networks with IoT devices connected
to them. Information security such as messages between these nodes is now
critical issue since any intruder can reach these nodes and change or insert any
messages.
The objective of this work is to design and implement a secure messages
between IoT nodes by using a stream cipher such that it maintain the lite weight
payload such that it would not affect the overall performance of the system.
Definition
IoT is basically an interconnection of sensors, actuators, and
computing devices. It emphasizes that “things” (devices) are
connected and communicate rather than peoples.
Internet of Things
The technology of IoT is relatively new and had open a numerous
challenges applications in different fields of life.
IoT Platform
Top IoT Operating Systems
IPV4:
the internet implies that devices will use the IP address as a unique identifier. due to
the limited address space of IPv4 (which allows for 4.3 billion unique addresses),
objects and solution in the IoT will have to use IPv6 to accommodate the extremely
large address space required.
Bandwidth :
Due to high amount of devices connected to internet, the bandwidth is a critical
point since there are extremely high data traffic; therefore, 5G is the solution for this
challenge.
Challenges in IoT
Quality of Service (QoS) :
sharing workload between different nodes will offer more available resources, hence
improving QoS. Such collaborative work is a promising mechanism in IoT.
Security and privacy:
When devices are connected to internet, then location would not be an important issue
for intruders where they can attack these devices from anywhere in the globe ,The
solution ,The first solution Data security is to protect the data protected by one of the
encryption methods according to the application I work on ,The second solution is to
protect the network means the devices are connected to how to protect it.
Challenges in IoT
Key IoT Security Technology
COMMUNICATION
SECURITY
ENCRYPTION
Cryptography
These are two main important part of cryptography. The cryptography also posses two main process.
I. Private key/symmetric key: This posse’s only one key.
II. Public key/asymmetric key: This key posses two different key means we will encrypt our information
from one key while decrypt our information from another different key.
A powerful method of data encryption is the one-time-pad
algorithm, where each single piece of data is encrypted individually
with a unique key. The disadvantage of this method is that it
requires a vast number of keys; a Pseudo Random Number
Generator (PRNG) could be used to generate the required keys,
but it is problematic in terms of the key repetition.
One Time Pad
For example, the key sequence generated by a random generator is as
follows:
pad = ki = k1,k2,k3,...,kn, ki ∈[0,1]
The original message which will be encrypted by the pad keys is as follows:
message = mi = m1,m2,m3,...,mn, mi ∈[0,1]
Then the cipher is as follows:
ci = mi ⊕ki
To decrypt the cipher in the receiver side, the following function is used:
mi = (mi ⊕ki)⊕ki
One Time Pad
DNA Deoxyribo Nucleic Acid (DNA) is a biochemical macromolecule that
contains genetic information for the living beings. A genomic molecule
consists of a nucleotides structure with double stranded chains, bonded
together between bases A-T and G-C .Four types of bases are found in two
strands: Adenine A, Thymine T , Cytosine C , and Guanine G. A single strand
have a specific pattern sequence of bases. The other strand will have the
complement nucleotides of the other strand.
DNA
Hardware and Software tools
Hardware:
A raspberry pi platform would be used in this work, since it is
powerful, small size, cheap, and has good connectivity to internet. But
the main advantage of this platform is that it is installed with
operating system(Raspian one of Linux ditrbutions).
Software:
A Python 2.7 is used for encryption and decryption since it is open
source and it is one of the most development programming tools used
in IoT.
Primary Result
Implemention In Python (Encryption)
Implemention In Python (Decryption)
MQTT Protocol
Message Queuing Telemetry Transport (MQTT) is a publish-
subscribe server- client messaging protocol which has been
designed for machine –to- machine (M2M) lightweight
communications uses TCP communication protocol and
enables real time data transfer between connected devices.
Data Encryption and Decryption over
MQTT Protocol:
Decrypt msg
(OTP+DNA)
sub
pub
Encrypt msg
(OTP+DNA)
MQTT
Several generations of Raspberry Pis have been released. All models feature a Bord
Computer on Chip (SoC) with an integrated ARM-compatible. Processor speed
ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+; on-board memory ranges
from 256 MB to 1 GB RAM. SD cards are used to store the operating system and
program memory. The boards have one to four USB ports. For video output,
HDMI. Also a WiFi and Bluetooth are available making this bourd one of the most
useful connectivity device in IoT .
RASPBERRY PI
Case Study
Vehicle Network :
V2V: Vehicle - Vehicle
V2I : Vehicle – infrastructure
Thank you…
Q&A

Más contenido relacionado

Similar a Internet of Things (IoT) Security using stream cipher.ppt

small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptxEshwar Prasad
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017Jian-Hong Pan
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherBRNSSPublicationHubI
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
 

Similar a Internet of Things (IoT) Security using stream cipher.ppt (20)

Iot Security
Iot SecurityIot Security
Iot Security
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
575 579
575 579575 579
575 579
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of Things
 

Último

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Último (20)

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

Internet of Things (IoT) Security using stream cipher.ppt

  • 1. Internet of Things (IoT) Security using stream cipher
  • 2. Presentation outlines: 1. Abstract 2. Problem Definition 3. Definition IoT 4. IoT Platform, operating systems, development tools 5. Challenges in IoT 6. Key IoT Security Technology 7. Cryptography 8. One time pad 9. DNA 10. Hardware and Software tools 11. Implementation in Python (Encryption) & (Decryption) 12. MQTT Protocol 13. RASPBERRY PI 14. Case Study
  • 3. Abstract Internet of Things (IoT) is a rapid technology that enables devices to communicate and share information between them. It consists of things "devices" with ability of internet connectivity and networking. Due to increasing needs of secure environment in IoT application, the security is becoming an attractive field for the researchers. Connecting devices to the internet will facilitate the hackers attack since they can reach the data from anywhere in the globe. The weaknesses in security causes serious economic and privacy loss . In this work, an encryption-decryption process based stream cipher has been used. The messages between IoT nodes (Raspberry Pi) is encrypted using linear feedback shift register as a pseudo number key generator for one time pad stream cipher, along with a DNA computing. A vihcle network would be taken as a case study for this work.
  • 4. Problem Definition IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT). IoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them. Information security such as messages between these nodes is now critical issue since any intruder can reach these nodes and change or insert any messages. The objective of this work is to design and implement a secure messages between IoT nodes by using a stream cipher such that it maintain the lite weight payload such that it would not affect the overall performance of the system.
  • 5. Definition IoT is basically an interconnection of sensors, actuators, and computing devices. It emphasizes that “things” (devices) are connected and communicate rather than peoples.
  • 6. Internet of Things The technology of IoT is relatively new and had open a numerous challenges applications in different fields of life.
  • 9. IPV4: the internet implies that devices will use the IP address as a unique identifier. due to the limited address space of IPv4 (which allows for 4.3 billion unique addresses), objects and solution in the IoT will have to use IPv6 to accommodate the extremely large address space required. Bandwidth : Due to high amount of devices connected to internet, the bandwidth is a critical point since there are extremely high data traffic; therefore, 5G is the solution for this challenge. Challenges in IoT
  • 10. Quality of Service (QoS) : sharing workload between different nodes will offer more available resources, hence improving QoS. Such collaborative work is a promising mechanism in IoT. Security and privacy: When devices are connected to internet, then location would not be an important issue for intruders where they can attack these devices from anywhere in the globe ,The solution ,The first solution Data security is to protect the data protected by one of the encryption methods according to the application I work on ,The second solution is to protect the network means the devices are connected to how to protect it. Challenges in IoT
  • 11. Key IoT Security Technology COMMUNICATION SECURITY ENCRYPTION
  • 12. Cryptography These are two main important part of cryptography. The cryptography also posses two main process. I. Private key/symmetric key: This posse’s only one key. II. Public key/asymmetric key: This key posses two different key means we will encrypt our information from one key while decrypt our information from another different key.
  • 13. A powerful method of data encryption is the one-time-pad algorithm, where each single piece of data is encrypted individually with a unique key. The disadvantage of this method is that it requires a vast number of keys; a Pseudo Random Number Generator (PRNG) could be used to generate the required keys, but it is problematic in terms of the key repetition. One Time Pad
  • 14. For example, the key sequence generated by a random generator is as follows: pad = ki = k1,k2,k3,...,kn, ki ∈[0,1] The original message which will be encrypted by the pad keys is as follows: message = mi = m1,m2,m3,...,mn, mi ∈[0,1] Then the cipher is as follows: ci = mi ⊕ki To decrypt the cipher in the receiver side, the following function is used: mi = (mi ⊕ki)⊕ki One Time Pad
  • 15. DNA Deoxyribo Nucleic Acid (DNA) is a biochemical macromolecule that contains genetic information for the living beings. A genomic molecule consists of a nucleotides structure with double stranded chains, bonded together between bases A-T and G-C .Four types of bases are found in two strands: Adenine A, Thymine T , Cytosine C , and Guanine G. A single strand have a specific pattern sequence of bases. The other strand will have the complement nucleotides of the other strand. DNA
  • 16. Hardware and Software tools Hardware: A raspberry pi platform would be used in this work, since it is powerful, small size, cheap, and has good connectivity to internet. But the main advantage of this platform is that it is installed with operating system(Raspian one of Linux ditrbutions). Software: A Python 2.7 is used for encryption and decryption since it is open source and it is one of the most development programming tools used in IoT.
  • 17. Primary Result Implemention In Python (Encryption)
  • 18. Implemention In Python (Decryption)
  • 19. MQTT Protocol Message Queuing Telemetry Transport (MQTT) is a publish- subscribe server- client messaging protocol which has been designed for machine –to- machine (M2M) lightweight communications uses TCP communication protocol and enables real time data transfer between connected devices.
  • 20. Data Encryption and Decryption over MQTT Protocol: Decrypt msg (OTP+DNA) sub pub Encrypt msg (OTP+DNA) MQTT
  • 21. Several generations of Raspberry Pis have been released. All models feature a Bord Computer on Chip (SoC) with an integrated ARM-compatible. Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+; on-board memory ranges from 256 MB to 1 GB RAM. SD cards are used to store the operating system and program memory. The boards have one to four USB ports. For video output, HDMI. Also a WiFi and Bluetooth are available making this bourd one of the most useful connectivity device in IoT . RASPBERRY PI
  • 22. Case Study Vehicle Network : V2V: Vehicle - Vehicle V2I : Vehicle – infrastructure