Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography

被引:1
|
作者
Albalas, Firas [1 ]
Al-Soud, Majd [1 ]
Almomani, Omar [2 ]
Almomani, Ammar [3 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[2] World Islamic Sci & Educ Univ, Network Comp & Informat Syst Dept, Amman, Jordan
[3] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
关键词
IoT; CoAP; ECC; energy saving; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently, the concept of the Internet of Things (IoT) has become more noticeable where it is being used in all aspects of life, such as home automation, smart cities, military surveillance, security, agriculture, healthcare, etc., However, the heterogeneity of the constrained devices and the complexity of the internet bring up the need for a security system to secure all the communications, data and participating things. In this paper, This paper proposed a lightweight secure Constrained Application Protocol (CoAP) using Elliptic Curve Cryptography (ECC) to transport security between IoT objects and the Resource Directory (RD). The advantage of using ECC is its compact key size enabling it to utilize a smaller key size compared to the other identification methods such as Rivest-Shamir-Adleman (RSA). This work mainly has two parts; the first part implements the CoAP using ECC and using RSA algorithms where the results have proven that using ECC much better than RSA in terms of energy saving. The second part of this paper shows the proposed evaluation function and focuses on the security services that were applied in the proposed protocol. The results show that authentication achieved a 75.3% energy savings, data integrity had a 55.7% energy saving and confidentiality achieved a 47% energy saving.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 50 条
  • [1] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1867 - 1896
  • [2] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Suman Majumder
    Sangram Ray
    Dipanwita Sadhukhan
    Muhammad Khurram Khan
    Mou Dasgupta
    Wireless Personal Communications, 2021, 116 : 1867 - 1896
  • [3] Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
    Preethi, Preethi
    Ulla, Mohammed Mujeer
    Yadav, G. Praveen Kumar
    Roy, Kumar Sekhar
    Hazarika, Ruhul Amin
    Saxena, K. Kuldeep
    JOURNAL OF ENGINEERING, 2024, 2024
  • [4] Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things
    Shen Guicheng
    Yu Zhen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 452 - 455
  • [5] A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Adeniyi, Abidemi Emmanuel
    Jimoh, Rasheed Gbenga
    Awotunde, Joseph Bamidele
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [6] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [7] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [8] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [9] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [10] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784