Open Access   Article Go Back

Security of Personal Data on Internet of Things Using AES

Sadiya Shakil1 , Vineet Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 35-39, Jun-2016

Online published on Jul 01, 2016

Copyright © Sadiya Shakil , Vineet Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sadiya Shakil , Vineet Singh, “Security of Personal Data on Internet of Things Using AES,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.35-39, 2016.

MLA Style Citation: Sadiya Shakil , Vineet Singh "Security of Personal Data on Internet of Things Using AES." International Journal of Computer Sciences and Engineering 4.6 (2016): 35-39.

APA Style Citation: Sadiya Shakil , Vineet Singh, (2016). Security of Personal Data on Internet of Things Using AES. International Journal of Computer Sciences and Engineering, 4(6), 35-39.

BibTex Style Citation:
@article{Shakil_2016,
author = {Sadiya Shakil , Vineet Singh},
title = {Security of Personal Data on Internet of Things Using AES},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {35-39},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=963},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=963
TI - Security of Personal Data on Internet of Things Using AES
T2 - International Journal of Computer Sciences and Engineering
AU - Sadiya Shakil , Vineet Singh
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 35-39
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1735 1583 downloads 1502 downloads
  
  
           

Abstract

This paper includes the process of implementing cryptographical rule on the idea of AES. As Cryptography is that method of changing plaintext into cipher text changing keys to secure our personal knowledge. While to provide a system with security services comes at the expense of system performance.IOT devices area unit connected to internet of things. This paper deal with the implementation of AES using Internet of things and the motive is to find the elapsed time of encryption and decryption by enhancing the key generation of AES. IOT is network of physical objects, device, vehicles building. So The paper contributes the analysis of the performances of AES algorithm. AES is one of the standardized high security rule. it's enforced in varied hardware devices and varied code languages. This paper explores the implementation of AES in MATLAB. A MATLAB code is developed for plaintext encoding and cipher text decipherment.. The elapsed time will be calculated for comparing the performances of file sizes. Hence the result will show how the file size is effecting the performance of elapsed time and plotting of the graph will show the evaluation in diagrammatic forms.

Key-Words / Index Term

AES, Internet of things, Encryption techniques, Security, Performances analysis, Elapsed time

References

[1] AL.Jeeva1, Dr.V.Palanisamy and K.Kanagaram, “Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037.
[2]Sadiya Shakil and Vineet singh "security of personal data in internet of things using cryptography algorithm,"International journal of engineering and science computing"
[3]Anjali Nigam and Vineet singh "A study on Data transmission Secuirty threats in cloud in "international journal of innovative research in computer and commjncation engineering"
[4] Nidhi Singhal and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, Vol 2, Issue 6, July-Aug 2011, pp.177-18
[5]Allam Mousa and Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science & Applications, Vol 3,Issue 2, June 2006, pp.44-56.
[6] Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, First International Conference on IEEE Information and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89.
[7] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol. 14, No. 2, pp (105-110), Feb 2016
[8]Das Debasis, Misra Rajiv. “Programmable CellularAutomata Based Efficient Parallel AES Encryption Algorithm”.International Journal of Network Security . Applications(IJNSA) VOL.3 No.6, November 2011.
[9]Hoang Trang and Nguyenimplementation of the algorithm" University of University HoChiMinh City Van L oi , "An efficient FPGA Advanced Encryption Standard Technology VietNam Nationa Recommendation for the Transitioning of Cryptographic Algorithms and Key Lengths, January 2011.
[10]Adam 1. Elbirt, W. Yip, B. Chetwynd, and C. Paar, "An FPGABased
Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists" IEEE Transactions On Very Large Scale Integration (Vl Si) Systems, Vol . 9, No. 4, August 2001 545
[11] Mohammed Elmogy Information Technology Dept., Faculty of Computers and Information, Mansoura University, Egypt,Internet of things. Vol. 4 No.06 Nov 2015
[12] Bolivar Torres et.al.,lntegration ofan rfid reader to a wireless sensor network and its use to identify an individual carrying rfidtags,lnternational Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol. 1, No.4, December 2010.
[13] R. Jason Weiss, Development Dimensions International. J. Philip Craiger, University ofNebraska-Omah
[14] Gartner cloud computing definition, http://www.gartner.com/itglossary/cloud-computing/