Securing data transfer in IOT environment
DOI:
https://doi.org/10.18372/2225-5036.22.10705Keywords:
cloud environment, encryption, IoT, AES, wireless connectionAbstract
New method has been developed that securing data exchange process. Third party compute module used to secure data coming over different devices to the cloud environment. The module serves as middleware between 2 dif-ferent endpoints and can handle several connections through wireless or wired connection. The OS adaptation are done in order to easy run custom software solution and adapt device to our goals. The encryption is done through symmetric algorithm, which was adapted to compute module in order to provide a high level speed and security. The two main improvements in algorithm are related to AES instruction usage and processing parallel computing. Cor-responding software solution that will manage encryption and decryption process is also described. Software solution consist from 2 parts, where first part is preinstalled in compute module and second part need setup in cloud environment. These 2 parts work together as whole system and ensure data connection securing without requesting lot of changes in exist application environment.References
The Developer’s IoT Playbook: What to Ex-pect and Where to Turn to Fast-Track Your IoT Initia-tives [Електронний ресурс]. – Режим доступу: https://www.business.att.com/content/whitepaper/idc-developers-iot-playbook.pdf.
Internet of Things in Logistics, DHL Trend Research, Cisco Consulting Services [Електронний ре-сурс]. – Режим доступу: http://www.dhl.com/.
content/dam/Local_Images/g0/New_aboutus/
innovation/DHLTrendReport_Internet_of_things.pdf.
MacGillivray C. Worldwide Internet of Things Forecast 2015-2020, IDC [Електронний ресурс]. – Ре-жим доступу: http://www.idc.com/getdoc.jsp?containerId=prUS25658015.
Saraireh S. Secure Data Communication Sys-tem Using Cryptography [Електронний ресурс]. – Ре-жим доступу: http://airccse.org/journal/cnc/5313cnc10.pdf.