Open Access   Article Go Back

Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel

D. Ene1 , V.I.E. Anireh2 , D. Matthias3

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-2 , Page no. 52-58, Feb-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i2.5258

Online published on Feb 28, 2020

Copyright © D. Ene, V.I.E. Anireh, D. Matthias . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Ene, V.I.E. Anireh, D. Matthias, “Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.52-58, 2020.

MLA Style Citation: D. Ene, V.I.E. Anireh, D. Matthias "Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel." International Journal of Computer Sciences and Engineering 8.2 (2020): 52-58.

APA Style Citation: D. Ene, V.I.E. Anireh, D. Matthias, (2020). Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel. International Journal of Computer Sciences and Engineering, 8(2), 52-58.

BibTex Style Citation:
@article{Ene_2020,
author = {D. Ene, V.I.E. Anireh, D. Matthias},
title = {Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {2},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {52-58},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5031},
doi = {https://doi.org/10.26438/ijcse/v8i2.5258}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i2.5258}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5031
TI - Data Link Layer Encryption for The Internet of Things Using Elliptic Curve Cryptography Over Visible Light Communication Channel
T2 - International Journal of Computer Sciences and Engineering
AU - D. Ene, V.I.E. Anireh, D. Matthias
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 52-58
IS - 2
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
253 271 downloads 192 downloads
  
  
           

Abstract

The Internet as a fast-growing communication infrastructure comes with additional challenges of cybersecurity. A few techniques have been created to provide security in the application, transport, or network layer of a network. Many organizations have worked to provide security at higher OSI layers, from application layer right down to the network layers, without any at the Data Link layer. This has opened up many systems to a variety of compromises and attacks. This study proposes the provision of the public key Elliptic Curve Cryptography to serve the Data Link Layer instead of the Media Access Control (MAC). In this study, visible light communication technology for fast data communication and secure data transmission on the data link layer using public-key cryptosystem are discussed. The visible light communication technology consists of Light Emitting Diodes (LED) that flicker at an incredibly high frequency, thereby enabling a very high-speed wireless communication and an elliptic curve encryption component that carries out an integrated encryption scheme using Elliptic Curve Integrated Encryption Scheme (ECIES) and a digital signature algorithm using Elliptic Curve Digital Signature Algorithm (ECDSA). For the data link layer security, the encryption procedure is applied to the communications server and the programmable circuit boards (PCB) controlling the visible light communication devices. While the complete system model was implemented in a program, a prototype of the architecture was implemented on a microFourQ-MSP-IAR Embedded Workbench IDE-MSP430 7.12.4, and Wolfram Mathematica. Two advantages of visible light communication and public-key encryption were demonstrated: 1) providing security for the data link layer messages. 2) using VLC to speed up the encryption and decryption process in the data link layer.

Key-Words / Index Term

Internet of Things, Simulated Systems, Visible Light Communications, Elliptic Curve Cryptography, VLC, ECC, IoT, OSI, Data Link Layer, PKI

References

[1]  G.
Bora, S. Bora, S. Singh, & S.M. Arsalan, OSI reference model: An
overview. International Journal of Computer Trends and Technology
(IJCTT)
Vol 7 Issue 4, pp.214-218, 2014.



[2]  Y.
Li, D. Li, W. Cui, and R. Zhang, "Research based on OSI model." In
the proceedings of the 2011 IEEE 3rd International Conference on Communication
Software and Networks (3ICCSN - 2011), Xi`an, China, pp.554-557,
2011.



[3]  N.
Briscoe, "Understanding the OSI 7-layer model." PC Network
Advisor
 Vol 120 Issue 2,
pp.13-16, 2000.



[4]  J.
Franklin, D. McCoy, P. Tabriz, V. Neagoe, J.V. Randwyk, and D. Sicker,  Passive Data Link Layer 802.11 Wireless
Device Driver Fingerprinting. In USENIX Security Symposium Vol. 3, pp. 16-89, 2006.



[5]  S.
M. AlMheiri and H. S. AlQamzi, "Data link layer security protocols in
Wireless Sensor Networks: A survey," 2013 10th Ieee International
Conference on Networking, Sensing and Control (ICNSC - 2013), pp.312-317, 2013.



[6]  M.
Meribout and A. Al Naamany, "A collision-free data link layer protocol for
wireless sensor networks and its application in intelligent transportation
systems," 2009 Wireless Telecommunications Symposium, Prague, pp.1-6,
2009.



[7]  D.
Altolini, V. Lakkundi, N. Bui, C. Tapparello and M. Rossi, "Low power link
layer security for IoT: Implementation and performance analysis," 2013
9th International Wireless Communications and Mobile Computing Conference
(IWCMC)
, Sardinia, pp.919-925 2013.



[8]  A.
Annapurna, S. Madhuri, & D. Mohammed. Data Link Layer Security Issues. International
Journal of Computer Science & Engineering Technology
, Vol 4 Issue 7, pp.1009-1102, 2013.



[9]  B.
Alotaibi, & K. Elleithy. A New MAC Address Spoofing
Detection Technique Based on Random Forests, Sensors,
Vol
16,

Issue 681,
pp.1-14, 2016.



[10] T. OConnor, Detecting and Responding to Data Link Layer
Attacks. Boston: SANS Institute 2019.



[11]K. Singh, Security Issues in Wireless Networks. Research
Gate, pp. 1-5, 2014.



[12]K. Tao, J. Li, & S. Sampalli, Detection of Spoofed MAC
Addresses in 802.11 Wireless Networks. Springer, Vol 1, Issue 23, pp.201-213, 2008.



[13]L. Wong, An Overview of 802.11 Wireless Network Security
Standards; Mechanisms. Swansea: SANS Institute, 2005.



[14] H. Haas, Li-Fi - "Shedding Light on Future Wireless
Communications." 2011 TED Conference, Edinburgh. 2015.



[15]J. Patel, F. Suthar, & S..V.O. Khanna, "A Critical
Analysis on Encryption Techniques used for Data Security in Cloud Computing and
IoT (Internet of Things) based Smart cloud storage System: A Survey,"
International Journal of Scientific Research in Network Security and
Communication, Vol.7, Issue.2, pp.21-25, 2019.



[16]E.I. Davies & V.I.E. Anireh, Design and Implementation of
Smart Home System Using Internet of Things. Journal of Digital Innovations
& Contemp Res. In Sc., Eng & Tech, Vol
7, Issue 1,
pp.22-42, 2019.



[17]A. Oyegoke, The constructive research approach in project
management research. International Journal of Managing Projects in Business, Vol 8, Issue 5/6, pp. 573–595, 2011.



[18] G. Crnkovic, Constructive Research and Info-computational
Knowledge Generation. Springer, Vol 314,
Issue 1,
pp. 359–380, 2010.



[19]M. Morales-Sandoval, Hardware architecture for elliptic curve
cryptography and lossless data compression. Puebla: Computer Science
Department National Institute for Astrophysics, Optics and Electronics
. pp. 1-89, 2004.



[20]R.Piplode,
P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud
Computing," International Journal of Scientific Research in Computer
Science and Engineering
, Vol.1,
Issue.1, pp.26-30, 2013.