Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication

Full Text (PDF, 787KB), PP.17-30

Views: 0 Downloads: 0


Sajid Bin-Faisal 1,* Dip Nandi 2 Mashiour Rahman 2

1. American International University - Bangladesh, Dhaka, 1229, Banglades

2. Department of Computer Science, American International University - Bangladesh, Dhaka, 1229, Bangladesh

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2022.02.02

Received: 21 Aug. 2021 / Revised: 11 Oct. 2021 / Accepted: 6 Nov. 2021 / Published: 8 Apr. 2022

Index Terms

Communication, VANET, Security, Scheme, IoT, Integrity, Confidentiality, Encryption, Symmetric


In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.

Cite This Paper

Sajid Bin-Faisal, Dip Nandi, Mashiour Rahman, "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication", International Journal of Information Technology and Computer Science(IJITCS), Vol.14, No.2, pp.17-30, 2022. DOI: 10.5815/ijitcs.2022.02.02


[1] Loi, F., Sivanathan, A., Gharakheili, H. H., Radford, A., & Sivaraman, V. (2017, November). Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (pp. 1-6).

[2] Yu, X., & Guo, H. (2019, August). A survey on IIoT security. In 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS) (pp. 1-5). IEEE.

[3] Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The industrial internet of things (IIoT): An analysis framework. Computers in industry, 101, 1-12.

[4] Minoli, D., & Occhiogrosso, B. (2019). Practical aspects for the integration of 5G networks and IoT applications in smart cities environments. Wireless Communications and Mobile Computing, 2019.

[5] Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., & Pal, A. (2013, September). Lightweight security scheme for vehicle tracking system using CoAP. In Proceedings of the International Workshop on Adaptive Security (pp. 1-8).

[6] Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications.

[7] Sharma, P. (2013). Evolution of mobile wireless communication networks-1G to 5G as well as future prospective of next generation communication network. International Journal of Computer Science and Mobile Computing, 2(8), 47-53.

[8] Zhang, H., Babar, M., Tariq, M. U., Jan, M. A., Menon, V. G., & Li, X. (2020). SafeCity: Toward safe and secured data management design for IoT-enabled smart city planning. IEEE Access, 8, 145256-145267.

[9] Hwang, Y. H. (2015, April). Iot security & privacy: threats and challenges. In Proceedings of the 1st ACM workshop on IoT privacy, trust, and security (pp. 1-1).

[10] Raza, M., Iqbal, M., Sharif, M., & Haider, W. (2012). A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal, 19(4), 439-444.

[11] Owens, J., & Matthews, J. (2008, March). A study of passwords and methods used in brute-force SSH attacks. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET).

[12] Dave, K. T. (2013). Brute-force attack seeking but distressing. Int. J. Innov. Eng. Technol. Brute-force, 2(3), 75-78.

[13] Bošnjak, L., Sreš, J., & Brumen, B. (2018, May). Brute-force and dictionary attack on hashed real-world passwords. In 2018 41st international convention on information and communication technology, electronics and microelectronics (mipro) (pp. 1161-1166). IEEE.

[14] Kim, C. H., & Quisquater, J. J. (2007, September). How can we overcome both side channel analysis and fault attacks on RSA-CRT?. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007) (pp. 21-29). IEEE.

[15] Dahiya, S., & Bohra, M. (2017, October). Hybrid parallel partial model for robust & secure authentication in healthcare IoT environments. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON) (pp. 239-243). IEEE.

[16] Manikandan, N., & Subha, S. (2018). Parallel AES algorithm for performance improvement in data analytics security for IoT. International Journal of Networking and Virtual Organisations, 18(2), 112-129.

[17] Ramadhani, E. H., Kabetta, H., & Amiruddin, A. (2020, December). Exploration of the Security of Free Data Encryption Applications for Cloud Storage. In IOP Conference Series: Materials Science and Engineering (Vol. 1007, No. 1, p. 012042). IOP Publishing.

[18] Bursać, M., Vulović, R., & Milosavljević, M. Comparative Analysis of the Open Source Tools Intended for Data Encryption.

[19] https://www.axcrypt.net. Available [online]. Accessed: 26 July 2021.

[20] Das, S. K., Hossain, M. A., Sardar, M. A., Biswas, R. K., & Nath, P. D. (2014). Performance Analysis of Client Side Encryption Tools. International Journal of Advanced Computer Research, 4(3), 888.

[21] Latha, S., Raju, K., & Santhi, S. (2014). Overview of dropbox encryption in cloud computing. Transactions on Engineering and Sciences, 2(3), 27-32.

[22] https://www.boxcryptor.com. Available [Online].

[23] https://www.cloudwards.net. Available [Online].

[24] https://cryptomator.org. Available [Online].

[25] https://7ziphelp.com. Available [Online].

[26] Daman, R., & Tripathi, M. M. (2015). Encryption tools for secured health data in public cloud. International Journal of Innovative Science, Engineering & Technology, 2(11), 843-848.

[27] Singh, J. (2017). Study on challenges, opportunities and predictions in cloud computing. International Journal of Modern Education and Computer Science, 9(3), 17.

[28] Sathiyanarayanan, M., Mahendra, S., & Vasu, R. B. (2018, August). Smart Security System for Vehicles using Internet of Things (IoT). In 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 430-435). IEEE.

[29] Lombardo, A., Merelli, E., & Palazzo, S. (1988, January). Implementation of encryption services in the OSI upper layers. In 1988 Computer Networking Symposium (pp. 107-108). IEEE Computer Society.

[30] Pawar, A. B., & Ghumbre, S. (2016, December). A survey on IoT applications, security challenges and counter.

[31] Rijmen, V., & Daemen, J. (2001). Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology, 19-22.

[32] Liu, J. J., Huang, Y. L., Leu, F. Y., Pan, X. Y., & Chen, L. R. (2017, October). Generating dynamic box by using an input string. In International Symposium on Mobile Internet Security(pp. 17-29). Springer, Singapore.

[33] Bulens, P., Standaert, F. X., Quisquater, J. J., Pellegrin, P., & Rouvroy, G. (2008, June). Implementation of the AES-128 on Virtex-5 FPGAs. In International Conference on Cryptology in Africa (pp. 16-26). Springer, Berlin, Heidelberg.

[34] Minni, R., Sultania, K., Mishra, S., & Vincent, D. R. (2013, July). An algorithm to enhance security in RSA. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-4). IEEE.

[35] Khatoon, A., & Ikram, A. A. (2014). Performance Evaluation of RSA Algorithm in Cloud Computing Security. International journal of innovation and scientific research, 12(1), 336-345.

[36] Edelsbrunner, Gu, H., 2008. DESIGN AND ANALYSIS OF ALGORITHMS. [online] Www2.cs.duke.edu. Available at: < https://www2.cs.duke.edu/courses/fall08/cps230/Book.pdf >

[37] https://pycryptodome.readthedocs.io/ Available [Online].

[38] Rida Qayyum, Hina Ejaz, " Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science, Vol.12, No.2, pp. 30-35, 2020.

[39] Samia Jafrin, Dip Nandi, Sharfuddin Mahmood,"Test Case Prioritization based on Fault Dependency", International Journal of Modern Education and Computer Science, Vol.8, No.4, pp.33-45, 2016.