Fig. 1. Comparison of cipher communication and steganography communication
Fig. 2. Working example of the proposed text steganography communication
Fig. 3. Communication protocol of the proposed mutual authentication
Fig. 4. Implemented client device
Fig. 5. Android App of implemented server device
Fig. 6. Authentication failure of sever device
Fig. 7. Authentication failure of client device
References
- Wan Yeon Lee and Yun-Seok Choi, "Optimization of ARIA Block-Cipher Algorithm for Embedded Systems with 16-bits Processors," International Journal of Internet, Broadcasting and Communication, vol. 8, no. 1, pp. 88-98, Feb. 2016.
- M. Ebrahim, S. Khan and U. B. Khalid, "Symmetric Algorithm Survey: A Comparative Analysis," International Journal of Computer Applications, vol. 61, no. 20, pp. 12-19, Jan. 2013.
- S. B. Sasi and N. Sivan, "A Survey on Cryptography Using Optimization Algorithms in WSNs," Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, Feb. 2015.
- Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Cipher for Wireless Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006. https://doi.org/10.1145/1138127.1138130
- Meikang Qiu, Hai Su, Min Chen, Zhong Ming, and Laurence T. Yang, "Balance of Security Strength and Energy for PMU Monitoring Systems in Smart Grid," IEEE Communications Magazine, vol. 50, no. 5, pp. 142-149, May 2012. https://doi.org/10.1109/MCOM.2012.6194395
- Rene Hummen, Jan H. Ziegeldorf, Hossein Shafagh, Shahid Raza and Klaus Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," ACM HotWiSec, pp. 54-63, April 2013.
- William Stalling, Cryptography and Network Security: Principles and Practices (6th Edition), Prentice Hall, 2013.
- National Institute of Standards and Technology (NIST), "Advanced Encryption Standards (AES)," Federal Information Processing Standards Publication 197, pp. 1-26, Nov. 2001.
- T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel, "A Survey of Lightweight-Cryptography Implementations," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 522-533, Nov.-Dec. 2007. https://doi.org/10.1109/MDT.2007.178
- Gi-tae Park, Hyo-joon Han and Jae-hwoon Lee, "Design and Implementation of Lightweight Encryption Algorithm on OpenSSL," The Journal of Korean Institute of Communications and Information Sciences, vol. 39B, no. 12, pp. 822-830, 2014.
- Wan Yeon Lee, "Performance Evaluation of Lightweight Security Algorithms for Embedded Systems with Low Capacity," Dongduk Journal of Natural Science and Computer Science, vol. 3, pp. 71-80, Dec. 2018.
- Geum-Boon Lee, "A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits," Journal of the Korea Society of Computer and Information, vol. 22, no. 9, pp. 65-71, Sep. 2017. https://doi.org/10.9708/JKSCI.2017.22.09.065
- Seokhyang Cho, "An Efficient Group Key Agreement Using Hierarchical Key Tree in Mobile Environment," Journal of the Korea Society of Computer and Information, vol. 23, no. 2, pp. 53-61, Feb. 2018. https://doi.org/10.9708/JKSCI.2018.23.02.053
- Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on Null Space," IOSR Journal of Computer Engineering, vol. 3, no. 4, pp. 11-17, July-Aug. 2012. https://doi.org/10.9790/0661-0341117
- Hwa-Jeong Seo, Tae-Hwan Park and Ga-Ram Lee, "Implementation Technique of Symmetric-Key Cryptography on Lightweight IoT Platforms," Korea Institute of Information Security and Cryptology, vol. 27, no. 6, pp. 15-20, Dec. 2017. https://doi.org/10.13089/JKIISC.2017.27.1.15
- Seon-Keun Lee, "A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment," Journal of the Korea Academia-Industrial Cooperation Society, vol. 19, no. 3, pp. 1-7, 2018. https://doi.org/10.5762/KAIS.2018.19.3.1