Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things

被引:9
|
作者
Harbi, Yasmine [1 ]
Aliouat, Zibouda [1 ]
Harous, Saad [2 ]
Bentaleb, Abdelhak [3 ]
机构
[1] Ferhat Abbas Univ Setif1, Comp Sci Dept, LRSD Lab, Setif, Algeria
[2] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[3] Natl Univ Singapore, Singapore, Singapore
关键词
Security; Privacy; Wireless Sensor Networks; Security requirements; Security attacks;
D O I
10.1007/978-3-030-05481-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has made extraordinary progress in human lives from healthcare applications to daily chores. The IoT enables everyday object to be connected to the Internet. These devices are embedded with sensors and actuators in order to collect and share data. However, the transmission of the collected data may face several security and privacy concerns. To overcome this problem, we propose a Secure Data Transmission Scheme (SDTS) that improves communication security in cluster-based Wireless Sensor Networks (WSNs). The SDTS is based on Elliptic Curve Cryptography (ECC) due to its ability to provide high security level with small key size. The proposed method achieves several security requirements including confidentiality, integrity, and authentication. Moreover, it resists different security attacks like brute force attack, replay attack, and sinkhole attack. The performance analysis shows that SDTS is relatively efficient in term of communication cost.
引用
收藏
页码:34 / 46
页数:13
相关论文
共 50 条
  • [31] ELLIPTIC CURVE CRYPTOGRAPHY FOR CONSTRAINED DEVICES IN INTERNET OF THINGS AND INDUSTRY 4.0
    Cvrcek, Tadeas
    PROCEEDINGS II OF THE 26TH CONFERENCE STUDENT EEICT 2020, 2020, : 48 - 51
  • [32] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [33] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [34] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801
  • [35] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [36] Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card
    Bai, T. Daisy Premila
    Raj, K. Michael
    Rabara, S. Albert
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 43 - 46
  • [37] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1867 - 1896
  • [38] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Suman Majumder
    Sangram Ray
    Dipanwita Sadhukhan
    Muhammad Khurram Khan
    Mou Dasgupta
    Wireless Personal Communications, 2021, 116 : 1867 - 1896
  • [39] Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography
    Zou, Lina
    Wang, Xueying
    Deng, Lifeng
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (34)
  • [40] Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
    Liu, Zhe
    Seo, Hwajeong
    Castiglione, Aniello
    Choo, Kim-Kwang Raymond
    Kim, Howon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 521 - 529