
network, and encryption keys will be redistributed
immediately from the sink node.
In addition, the attacking node will not be able to
decrypt the data in the network due to the encryption
process and the strength of the keys used.
5 Conclusions and recommendations
The model proposed in this paper helps to achieve
secure integration between the Internet of Things and
cloud computing using the hybrid encryption model
(AES-ECC). To secure a reliable connection between
the sensor nodes in the network and the cloud, store
the sensor data securely, encrypted without affecting
the packets delivery ratio, power consumption, and
provide lower execution time compared to the others
studies. The combined effect of both ECC and AES
is appropriate for the proposed cloud storage
technology to secure the system and helps to reduce
storage volume with encrypted data.
This research aims to combine the availability of
resources and maintain reliability and privacy when
achieving the integration between the Internet of
Things and cloud computing, and since each
application has its requirements and conditions so
this study is mainly directed to the Internet of Things
networks with fixed and random publishing nodes in
a field of study where data is collected from sensors
and sent to the cloud to store them confidentially,
Evaluate a set of parameters such as average power
consumption, packet delivery ratio, and the algorithm
execution time and compared to previous studies.
The model can be used in many IoT applications that
need speed, limited resources, and confidentiality in
the transmission and storage of sensitive data.
However, the concept of security needs more study
in the future to expand the concept of cloud
computing through encryption technologies. In the
future, this research could be improved by increasing
the security of hybrid approaches by adding multiple
layers of security to enhance system productivity and
efficiency.
References:
[1]Ari, A. A. A., Ngangmo, O. K., Titouna, C.,
Thiare, O., Kolyang, Mohamadou, A., Gueroiu, A.
M. (2019), “Enabling privacy and security in Cloud
of Things: Architecture, applications, security &
privacy challenges” Applied Computing and
Informatics, Vol. ahead-of-print No. ahead-of-print,
page 3.
[2]Rayes, A., and Salam, S., 2019, “Internet of
Things from Hype to Reality_ the Road to
Digitization” Second Edition, © Springer Nature
Switzerland AG.
[3]Sokat, B., 2020, “Blackhole Attacks in IoT
Networks" Master Thesis, Computer Engineering,
Engineering and Sciences of İzmir Institute of
Technology, İZMİR, 43p.
[4]Salman, O., Abdallah, S., Elhajj, I. H., Chehab,
A., and Kayssi, A., 2016, “Identity-Based
Authentication Scheme for the Internet of Things”,
978-1-5090-0679-3/16/$31.00 ©2016 IEEE.
[5]Ahmed, F., and Young-Bae Ko, 2016,
“Mitigation of black hole attacks in Routing
Protocol for Low Power and Lossy Networks”,
Wiley Online Library (wileyonlinelibrary.com).
DOI: 10.1002/sec.1684
[6]HASSAN, A., ISMAIL, A., 2017, “Evaluation of
encryption algorithms for IoT security” Bachelor of
Science in Communication Engineering,
Communication Engineering Department,
University of almughtaribeen, Khartoum, Sudan,
49p.
[7]Langendoerfer, P., Piotrowski, K., Díaz, M. ,and
Rubio, B., 2012, “Distributed Shared Memory as an
Approach for Integrating WSNs and Cloud
Computing” IEEE.
[8]Chenaru, O., Mihai, V., Popescu, D., and Ichim,
L., 2018, Member, IEEE “Integration of WSN, IoT
and Cloud Computing in Distributed Monitoring
System for Aging Persons in Active Life” 26th
Mediterranean Conference on Control and
Automation (MED) Zadar, Croatia.
[9]Othman, M. M., El-Mousa, A., 2020, “Internet
of Things & Cloud Computing Internet of Things as
a Service Approach”, 2020 11th International
Conference on Information and Communication
Systems (ICICS), Amman, Jordan.
[10]Latif, I.H., 2020, “Time Evaluation Of
Different Cryptography Algorithms Using
Labview” 2020 IOP Conf. Ser.: Mater. Sci. Eng.
745 012039View
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2022.4.10
P. Dr. Nadeem Chahin, Eng. Abeer Mansour