Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel

Authors

  • Ene D Dept. of Computer Science, Rivers State University, Port Harcourt, Nigeria
  • Anireh V Dept. of Computer Science, Rivers State University, Port Harcourt, Nigeria
  • Matthias D Dept. of Computer Science, Rivers State University, Port Harcourt, Nigeria

DOI:

https://doi.org/10.26438/ijcse/v8i2.5258

Keywords:

Internet of Things, Simulated System, Visible Light Communication, Elliptic Curve Cryptograp, VLC, ECC, IoT, OSI, Data Link Layer

Abstract

The Internet as a fast-growing communication infrastructure comes with additional challenges of cybersecurity. A few techniques have been created to provide security in the application, transport, or network layer of a network. Many organizations have worked to provide security at higher OSI layers, from application layer right down to the network layers, without any at the Data Link layer. This has opened up many systems to a variety of compromises and attacks. This study proposes the provision of the public key Elliptic Curve Cryptography to serve the Data Link Layer instead of the Media Access Control (MAC). In this study, visible light communication technology for fast data communication and secure data transmission on the data link layer using public-key cryptosystem are discussed. The visible light communication technology consists of Light Emitting Diodes (LED) that flicker at an incredibly high frequency, thereby enabling a very high-speed wireless communication and an elliptic curve encryption component that carries out an integrated encryption scheme using Elliptic Curve Integrated Encryption Scheme (ECIES) and a digital signature algorithm using Elliptic Curve Digital Signature Algorithm (ECDSA). For the data link layer security, the encryption procedure is applied to the communications server and the programmable circuit boards (PCB) controlling the visible light communication devices. While the complete system model was implemented in a program, a prototype of the architecture was implemented on a microFourQ-MSP-IAR Embedded Workbench IDE-MSP430 7.12.4, and Wolfram Mathematica. Two advantages of visible light communication and public-key encryption were demonstrated: 1) providing security for the data link layer messages. 2) using VLC to speed up the encryption and decryption process in the data link layer.

References

[1] G. Bora, S. Bora, S. Singh, & S.M. Arsalan, OSI reference model: An overview. International Journal of Computer Trends and Technology (IJCTT), Vol 7 Issue 4, pp.214-218, 2014.

[2] Y. Li, D. Li, W. Cui, and R. Zhang, "Research based on OSI model." In the proceedings of the 2011 IEEE 3rd International Conference on Communication Software and Networks (3ICCSN - 2011), Xi'an, China, pp.554-557, 2011.

[3] N. Briscoe, "Understanding the OSI 7-layer model." PC Network Advisor Vol 120 Issue 2, pp.13-16, 2000.

[4] J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J.V. Randwyk, and D. Sicker, Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In USENIX Security Symposium Vol. 3, pp. 16-89, 2006.

[5] S. M. AlMheiri and H. S. AlQamzi, "Data link layer security protocols in Wireless Sensor Networks: A survey," 2013 10th Ieee International Conference on Networking, Sensing and Control (ICNSC - 2013), pp.312-317, 2013.

[6] M. Meribout and A. Al Naamany, "A collision-free data link layer protocol for wireless sensor networks and its application in intelligent transportation systems," 2009 Wireless Telecommunications Symposium, Prague, pp.1-6, 2009.

[7] D. Altolini, V. Lakkundi, N. Bui, C. Tapparello and M. Rossi, "Low power link layer security for IoT: Implementation and performance analysis," 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, pp.919-925 2013.

[8] A. Annapurna, S. Madhuri, & D. Mohammed. Data Link Layer Security Issues. International Journal of Computer Science & Engineering Technology, Vol 4 Issue 7, pp.1009-1102, 2013.

[9] B. Alotaibi, & K. Elleithy. A New MAC Address Spoofing Detection Technique Based on Random Forests, Sensors, Vol 16, Issue 681, pp.1- 14, 2016.

[10]T. OConnor, Detecting and Responding to Data Link Layer Attacks. Boston: SANS Institute 2019.

[11]K. Singh, Security Issues in Wireless Networks. Research Gate, pp. 1- 5, 2014.

[12]K. Tao, J. Li, & S. Sampalli, Detection of Spoofed MAC Addresses in 802.11 Wireless Networks. Springer, Vol 1, Issue 23, pp.201-213, 2008.

[13]L. Wong, An Overview of 802.11 Wireless Network Security Standards; Mechanisms. Swansea: SANS Institute, 2005.

[14]H. Haas, Li-Fi - "Shedding Light on Future Wireless Communications." 2011 TED Conference, Edinburgh. 2015.

[15]J. Patel, F. Suthar, & S..V.O. Khanna, "A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IoT (Internet of Things) based Smart cloud storage System: A Survey," International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.21-25, 2019.

[16]E.I. Davies & V.I.E. Anireh, Design and Implementation of Smart Home System Using Internet of Things. Journal of Digital Innovations & Contemp Res. In Sc., Eng & Tech, Vol 7, Issue 1, pp.22-42, 2019.

[17]A. Oyegoke, The constructive research approach in project management research. International Journal of Managing Projects in Business, Vol 8, Issue 5/6, pp. 573–595, 2011.

[18]G. Crnkovic, Constructive Research and Info-computational Knowledge Generation. Springer, Vol 314, Issue 1, pp. 359–380, 2010.

[19]M. Morales-Sandoval, Hardware architecture for elliptic curve cryptography and lossless data compression. Puebla: Computer Science Department National Institute for Astrophysics, Optics and Electronics. pp. 1-89, 2004.

[20]R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing," International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26- 30, 2013

Downloads

Published

2020-02-28
CITATION
DOI: 10.26438/ijcse/v8i2.5258
Published: 2020-02-28

How to Cite

[1]
D. Ene, V. Anireh, and D. Matthias, “Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel”, Int. J. Comp. Sci. Eng., vol. 8, no. 2, pp. 52–58, Feb. 2020.

Issue

Section

Research Article