Data Security Model Using (AES-LEA) Algorithms for WoT Environment
The Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and prote...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | Arabic |
| Published: |
University of Information Technology and Communications
2025-06-01
|
| Series: | Iraqi Journal for Computers and Informatics |
| Subjects: | |
| Online Access: | https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850224996356456448 |
|---|---|
| author | Zinah A. Al-jazaeri Joolan Rokan Naif Ahmad Mohamad Ghandour |
| author_facet | Zinah A. Al-jazaeri Joolan Rokan Naif Ahmad Mohamad Ghandour |
| author_sort | Zinah A. Al-jazaeri |
| collection | DOAJ |
| description | The Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. The proposed method is designed to decrease encryption /decryption time for the information transmitted in the WoT environment and in areas such as government data that need protection against attacks. The proposed method comprises three sub-layers: Chaos Keys generation layer, Data encryption layer, and Authentication layer. The proposed method passed all 15 NIST ( National Institute of Standards & Technology) tests. The amount of time needed to encrypt and decrypt the proposed method was compared with the original encryption methods for different data sizes and five sensitivity levels, and the proposed encryption method was found to be up to (150%) faster while maintaining security strength. |
| format | Article |
| id | doaj-art-1d75d588ea174fa68400d64e6e75ea69 |
| institution | OA Journals |
| issn | 2313-190X 2520-4912 |
| language | Arabic |
| publishDate | 2025-06-01 |
| publisher | University of Information Technology and Communications |
| record_format | Article |
| series | Iraqi Journal for Computers and Informatics |
| spelling | doaj-art-1d75d588ea174fa68400d64e6e75ea692025-08-20T02:05:29ZaraUniversity of Information Technology and CommunicationsIraqi Journal for Computers and Informatics2313-190X2520-49122025-06-015119410710.25195/ijci.v51i1.559522Data Security Model Using (AES-LEA) Algorithms for WoT EnvironmentZinah A. Al-jazaeri0Joolan Rokan Naif1Ahmad Mohamad Ghandour2Islamic University of Lebanon-IULUniversity of Information Technology and CommunicationsIslamic University of Lebanon-IULThe Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. The proposed method is designed to decrease encryption /decryption time for the information transmitted in the WoT environment and in areas such as government data that need protection against attacks. The proposed method comprises three sub-layers: Chaos Keys generation layer, Data encryption layer, and Authentication layer. The proposed method passed all 15 NIST ( National Institute of Standards & Technology) tests. The amount of time needed to encrypt and decrypt the proposed method was compared with the original encryption methods for different data sizes and five sensitivity levels, and the proposed encryption method was found to be up to (150%) faster while maintaining security strength.https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559information security; aes algorithm; present algorithm; lea algorithm; chaotic system |
| spellingShingle | Zinah A. Al-jazaeri Joolan Rokan Naif Ahmad Mohamad Ghandour Data Security Model Using (AES-LEA) Algorithms for WoT Environment Iraqi Journal for Computers and Informatics information security; aes algorithm; present algorithm; lea algorithm; chaotic system |
| title | Data Security Model Using (AES-LEA) Algorithms for WoT Environment |
| title_full | Data Security Model Using (AES-LEA) Algorithms for WoT Environment |
| title_fullStr | Data Security Model Using (AES-LEA) Algorithms for WoT Environment |
| title_full_unstemmed | Data Security Model Using (AES-LEA) Algorithms for WoT Environment |
| title_short | Data Security Model Using (AES-LEA) Algorithms for WoT Environment |
| title_sort | data security model using aes lea algorithms for wot environment |
| topic | information security; aes algorithm; present algorithm; lea algorithm; chaotic system |
| url | https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559 |
| work_keys_str_mv | AT zinahaaljazaeri datasecuritymodelusingaesleaalgorithmsforwotenvironment AT joolanrokannaif datasecuritymodelusingaesleaalgorithmsforwotenvironment AT ahmadmohamadghandour datasecuritymodelusingaesleaalgorithmsforwotenvironment |