Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things

被引:9
|
作者
Harbi, Yasmine [1 ]
Aliouat, Zibouda [1 ]
Harous, Saad [2 ]
Bentaleb, Abdelhak [3 ]
机构
[1] Ferhat Abbas Univ Setif1, Comp Sci Dept, LRSD Lab, Setif, Algeria
[2] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[3] Natl Univ Singapore, Singapore, Singapore
关键词
Security; Privacy; Wireless Sensor Networks; Security requirements; Security attacks;
D O I
10.1007/978-3-030-05481-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has made extraordinary progress in human lives from healthcare applications to daily chores. The IoT enables everyday object to be connected to the Internet. These devices are embedded with sensors and actuators in order to collect and share data. However, the transmission of the collected data may face several security and privacy concerns. To overcome this problem, we propose a Secure Data Transmission Scheme (SDTS) that improves communication security in cluster-based Wireless Sensor Networks (WSNs). The SDTS is based on Elliptic Curve Cryptography (ECC) due to its ability to provide high security level with small key size. The proposed method achieves several security requirements including confidentiality, integrity, and authentication. Moreover, it resists different security attacks like brute force attack, replay attack, and sinkhole attack. The performance analysis shows that SDTS is relatively efficient in term of communication cost.
引用
收藏
页码:34 / 46
页数:13
相关论文
共 50 条
  • [21] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453
  • [22] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [23] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Neeraj Kumar
    The Journal of Supercomputing, 2018, 74 : 6428 - 6453
  • [24] A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks
    Verma, Upendra
    Bhardwaj, Diwakar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [25] New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography
    Su, Pin-Chang
    Tsai, Chien-Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5537 - 5555
  • [26] Towards application of biometrically based methods for secure transmission of spatial data using elliptic curve cryptography
    Martin, Chris
    Vert, Gregory
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 325 - 329
  • [27] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [28] Optimized video internet of things using elliptic curve cryptography based encryption and decryption
    Alhayani, Bilal S. A.
    Hamid, Nagham
    Almukhtar, Firas Husham
    Alkawak, Omar A.
    Mahajan, Hemant B.
    Kwekha-Rashid, Ameer Sardar
    Ilhan, Haci
    Marhoon, Haydar Abdulameer
    Mohammed, Husam Jasim
    Chaloob, Ibrahim Zeghaiton
    Alkhayyat, Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [29] An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2154 - 2163
  • [30] RETRACTED: Applicability of Elliptic Curve Cryptography on Internet of Things (Retracted Article)
    Zhao, Guanglei
    Wang, Jingcheng
    Luo, Jian
    Long, Xiao
    Si, Xianping
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11