Data Security Model Using (AES-LEA) Algorithms for WoT Environment

The Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and prote...

Full description

Saved in:
Bibliographic Details
Main Authors: Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour
Format: Article
Language:Arabic
Published: University of Information Technology and Communications 2025-06-01
Series:Iraqi Journal for Computers and Informatics
Subjects:
Online Access:https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850224996356456448
author Zinah A. Al-jazaeri
Joolan Rokan Naif
Ahmad Mohamad Ghandour
author_facet Zinah A. Al-jazaeri
Joolan Rokan Naif
Ahmad Mohamad Ghandour
author_sort Zinah A. Al-jazaeri
collection DOAJ
description The Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. The proposed method is designed to decrease encryption /decryption time for the information transmitted in the WoT environment and in areas such as government data that need protection against attacks. The proposed method comprises three sub-layers: Chaos Keys generation layer, Data encryption layer, and Authentication layer. The proposed method passed all 15 NIST ( National Institute of Standards & Technology) tests. The amount of time needed to encrypt and decrypt the proposed method was compared with the original encryption methods for different data sizes and five sensitivity levels, and the proposed encryption method was found to be up to (150%) faster while maintaining security strength.
format Article
id doaj-art-1d75d588ea174fa68400d64e6e75ea69
institution OA Journals
issn 2313-190X
2520-4912
language Arabic
publishDate 2025-06-01
publisher University of Information Technology and Communications
record_format Article
series Iraqi Journal for Computers and Informatics
spelling doaj-art-1d75d588ea174fa68400d64e6e75ea692025-08-20T02:05:29ZaraUniversity of Information Technology and CommunicationsIraqi Journal for Computers and Informatics2313-190X2520-49122025-06-015119410710.25195/ijci.v51i1.559522Data Security Model Using (AES-LEA) Algorithms for WoT EnvironmentZinah A. Al-jazaeri0Joolan Rokan Naif1Ahmad Mohamad Ghandour2Islamic University of Lebanon-IULUniversity of Information Technology and CommunicationsIslamic University of Lebanon-IULThe Web of Things WoT connects physical objects and displays them in the WWW. The growing number of Internet of Things IoT devices and data sharing has led to the attack on sensitive information and allowing unauthorized persons to access and manipulate it. Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. The proposed method is designed to decrease encryption /decryption time for the information transmitted in the WoT environment and in areas such as government data that need protection against attacks. The proposed method comprises three sub-layers: Chaos Keys generation layer, Data encryption layer, and Authentication layer. The proposed method passed all 15 NIST ( National Institute of Standards & Technology) tests. The amount of time needed to encrypt and decrypt the proposed method was compared with the original encryption methods for different data sizes and five sensitivity levels, and the proposed encryption method was found to be up to (150%) faster while maintaining security strength.https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559information security; aes algorithm; present algorithm; lea algorithm; chaotic system
spellingShingle Zinah A. Al-jazaeri
Joolan Rokan Naif
Ahmad Mohamad Ghandour
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Iraqi Journal for Computers and Informatics
information security; aes algorithm; present algorithm; lea algorithm; chaotic system
title Data Security Model Using (AES-LEA) Algorithms for WoT Environment
title_full Data Security Model Using (AES-LEA) Algorithms for WoT Environment
title_fullStr Data Security Model Using (AES-LEA) Algorithms for WoT Environment
title_full_unstemmed Data Security Model Using (AES-LEA) Algorithms for WoT Environment
title_short Data Security Model Using (AES-LEA) Algorithms for WoT Environment
title_sort data security model using aes lea algorithms for wot environment
topic information security; aes algorithm; present algorithm; lea algorithm; chaotic system
url https://ijci.uoitc.edu.iq/index.php/ijci/article/view/559
work_keys_str_mv AT zinahaaljazaeri datasecuritymodelusingaesleaalgorithmsforwotenvironment
AT joolanrokannaif datasecuritymodelusingaesleaalgorithmsforwotenvironment
AT ahmadmohamadghandour datasecuritymodelusingaesleaalgorithmsforwotenvironment