The International Arab Journal of Information Technology (IAJIT)


IoT Security Using AES Encryption Technology based ESP32 Platform

The Internet of Things (IoT) is one of the most important modern technologies that have attracted the most interesting areas of life, whether industrial, academic, or other, in recent years. The main goal is to integrate the physical world with the digital world through a seamless ecosystem, and this constitutes a new era for the Internet. This technology provides high commercial value to enterprises as it provides many opportunities in many applications such as energy, health, and other sectors. However, this technology suffers from many security problems, as it is considered the biggest challenge due to its complex environment and the limited resources of its devices. There is a lot of research to find successful security solutions in IoT, in this research, a proposed solution to secure IoT systems using Advanced Encryption Standard (AES) technology is achieved. Some sensors were linked as an example of the Internet of Things. The data is received by the card created and developed by Espressif Systems (ESP32) module, where its encrypted then sends to the internet site through an authorized person to be received from anywhere, and it is also possible to receive it via a published IP which is announced within the internal network of the ESP32 device module. The decryption part is proposed at last to find out the true values of the sensors. The proposed approach shows good secured and balanced results at the end.

[1] Abd Zaid M. and Hassan S., “Modification Advanced Encryption Standard for Design Lightweight Algorithms,” Journal of Kufa for Mathematics and Computer, vol. 6, no. 1, pp. 21- 27, 2019.

[2] Abdullah A., “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Cryptography and Network Security,” Ryptography and Network Security, vol. 16, pp. 1-11, 2017.

[3] Choi I. and Kim J., “Area-Optimized Multi- Standard AES-CCM Security Engine for IEEE 802.15. 4/802.15,” Journal of Semiconductor Technology and Science, vol.16, no. 3, pp. 293- 299, 2016.

[4] Chowdhury M., Ferdous M., Biswas K., Chowdhury N., Muthukkumarasamy V., “A Survey on Blockchain-Based Platforms for IoT Use-Cases,” The Knowledge Engineering Review, vol. 35, 2020.

[5] “ESP32 Series Datasheet,” Espressif Systems, Version 3.6, 2021.

[6] “ESP-IDF Programming Guide,” idf/en/latest/esp32/, Last Visited, 2020.

[7] Florin R. and Ionut R., “FPGA Based Architecture for Securing Iot with Blockchain,” in Proceedings of International Conference on Speech Technology and Human-Computer Dialogue, Timisoara, pp. 1-8, 2019.

[8] Hamzah H., Ahmad N., and Ruslan S., “The 128- Bit AES Design by Using FPGA,” Journal of Physics: Conference Series, vol. 1529, no. 2, pp. 022059, 2020.

[9] temperature-sensor#, Last Visited, 2020.

[10] sensor-working-pinout-datasheet, Last Visited, 2020.

[11] Hussein N. and Shujaa M., “DNA Computing Based Stream Cipher for Internet of Things Using MQTT Protocol,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp.1035, 2020.

[12] Inamdar A., “ESP32-S2-Security Features,” The ESP Journal, Journal/esp32-s2-security-improvements- 5e5453f98590, Last Visited, 2020.

[13] Khoa T., Nhu L., Son H., Trong N., Phuc C., Phuong N., Dung N., Nam N., Chau D., and Duc D., “Designing Efficient Smart Home Management with Iot Smart Lighting: A Case Study,” Wireless Communications and Mobile Computing, vol. 2020, pp.1-18, 2020.

[14] Kodali R. and Soratkal S., “MQTT Based Home Automation System Using ESP8266,” in Proceedings of IEEE Region 10 Humanitarian Technology Conference, Agra, pp. 1-5, 2016.

[15] Kouicem D., Bouabdallah A., and Lakhlef H., “Internet of Things Security: A Top-Down Survey,” Computer Networks. vol. 141, pp. 199- 221, 2018.

[16] Nandhini P. and Vanitha V., “A Study of Lightweight Cryptographic Algorithms for IoT,” International Journal of Innovations and Advancement in Computer Science, vol. 6, no. 1, pp. 26-35, 2017.

[17] Parida D., Behera A., Naik J., Pattanaik S., and Nanda R., “Real-time Environment Monitoring System Using ESP8266 and Thing Speak on Internet of Things Platform” in Proceedings of International Conference on Intelligent Computing and Control Systems, Madurai, pp. 225-229, 2019.

[18] Postulka J., “Programming of ESP32 Microcontrollers,” 2020.

[19] Raghavan R., “ Algorithms/,” and Encryption-Algorithms/, Last Visited, 2021.

[20] Selmane N., Guilley S., and Danger J., “Practical Setup Time Violation Attacks on AES,” in Proceedings of 7th European Dependable Computing Conference, Kaunas, pp. 91-96, 2008.

[21] Shanmuganathan H. and Mahendran A., “Encryption based on Cellular Automata for Wireless Devices in Iot Environment,” The International Arab Journal of Information Technology, vol. 18, no. 3, pp. 347-355, 2021.

[22] Vacha M., “IoT Device Security on the ESP32 platform,” Master's Thesis, Czech Technical University in Prague Computing and Information Center, 2020.

[23] Zhang J., Gao W., Li J., Tian X., and Dang H., “High-Speed and High-Security Hybrid AES-ECC Cryptosystem Based on FPGA,” in Proceedings of IEEE International Conference on Signal, Information and Data Processing, Chongqing, pp. 1-6, 2019.