2,340 Hits in 4.0 sec

Internet of Things: Impact of IoT in Business Environment and Challenges in Secure Implementation

2020 International journal of recent technology and engineering  
This paper highlights that how IoT may introduce the better opportunities in business and challenges of secure IoT connection and while communicating the IoT device.  ...  In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication.  ...  Digital signature verification time comparison.  ... 
doi:10.35940/ijrte.b3949.079220 fatcat:5d2kop5y4zgwtcmmqnsredavju

Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices [article]

Gustavo Banegas
2021 arXiv   pre-print
Taking the open-source implementation of SUIT available in RIOT as a case study, we overview post-quantum considerations, and quantum-resistant digital signatures in particular, focusing on lowpower, microcontroller-based  ...  IoT devices which have stringent resource constraints in terms of memory, CPU, and energy consumption.  ...  These schemes offer fast signing and verification, at the cost of relatively large signatures. Multivariate signatures.  ... 
arXiv:2106.05577v2 fatcat:pcg64enerzgqhe3qw6ime2vksi

ARIS: Authentication for Real-Time IoT Systems [article]

Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
2020 arXiv   pre-print
In this paper, we propose a new signature scheme called ARIS that pushes the limits of the existing digital signatures, wherein commodity hardware can verify 83,333 signatures per second.  ...  Although some fast authentication techniques have been proposed, some of them might not fully meet the needs of the emerging delay-aware IoT.  ...  This work is supported by the Department of Energy award DE-OE0000780 and NSF award #1652389.  ... 
arXiv:1903.02142v2 fatcat:otnx34ssgvdx3ckvl26akrbmhe

Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network

Oday A. Hassen, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, Yasmin A. Lotfy
2020 Symmetry  
The internet of things (IoT) technology, on the other hand, has become the main driver of the fourth industrial revolution, and is currently utilized in diverse fields of industry.  ...  New approaches have been established through improving the authentication methods in the blockchain to address the constraints of scalability and protection in IoT operating environments of distributed  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym12101699 fatcat:jio7qfvlcjamle3jwprobsgwb4

BlockTrack-L: A Lightweight Blockchain-based Provenance Message Tracking in IoT

Muhammad Shoaib Siddiqui, Toqeer Ali, Adnan Nadeem, Waqas Nawaz, Sami S.
2020 International Journal of Advanced Computer Science and Applications  
Data tracking is of great significance and a central part in digital forensics.  ...  In maintaining an audit trail of IoT devices or provenance of IoT device data, it is important to know the origins of requests to ensure certain level of trust in IoT data.  ...  of digital signature by outsourcing the mechanism to the Edge nodes.  ... 
doi:10.14569/ijacsa.2020.0110462 fatcat:7kzn4kb7m5gmbmajrois22bkum

A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security

Seong-Kyu Kim, Ung-Mo Kim, Jun-Ho Huh
2019 Energies  
There are also many security vulnerabilities in the sensor multi-platform from the IoT point of view.  ...  This technology is used in Machine-to-Machine (M2M) access payment—KYD (Know Your Device)—based on the reliability of existing IoT devices.  ...  of long-term verification of the digital signature.  ... 
doi:10.3390/en12030402 fatcat:vezgp3kgebaozaocsyu55lwd2y

Secure Firmware Updates for Constrained IoT Devices using Open Standards: A Reality Check

K. Zandberg, K. Schleiser, F. Acosta, H. Tschofenig, E. Baccelli
2019 IEEE Access  
While the IoT deployments multiply in a wide variety of verticals, the most IoT devices lack a built-in secure firmware update mechanism.  ...  We evaluate the performance of our implementation on a variety of commercial off-the-shelf constrained IoT devices.  ...  For instance, recent work on hyperelliptic curves includes qDSA [54] , a signature scheme that yields fast signatures and verifications for constrained IoT devices.  ... 
doi:10.1109/access.2019.2919760 fatcat:64plretunrg3xdqkxvefdr4qxu

A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications

Xuanxia Yao, Xiaoguang Han, Xiaojiang Du, Xianwei Zhou
2013 IEEE Sensors Journal  
Security is very important for Internet of Things (IoTs).  ...  In this paper, we revise the original Nyberg's fast one-way accumulator and construct a lightweight multicast authentication mechanism for small scale IoT applications.  ...  ., only dozens of receivers), the computation overhead is much lower than that of digital signature. In addition, logical multiplication and bits mapping are all simple bit operations in nature.  ... 
doi:10.1109/jsen.2013.2266116 fatcat:wj5dsu742ndr5cdc2uzm5nqnem

Smart Home - Application using HTTP/MQTT as Communication Protocols [article]

Muneeb Ahmed, Mohd Majid Akhtar
2021 Zenodo  
Additionally, intent authentication over HTTP is based on digital signature that is demonstrated using RSA (encryption) and MD5 (hashing) when the system is deployed in insecure environment(s).  ...  This study discloses the development of a solution for realizing a smart home in the post COVID-19 era using the Internet of Things domain knowledge.  ...  Digital signature based intent verification (for security on HTTP protocol) c.  ... 
doi:10.5281/zenodo.5791697 fatcat:jmamvim7rramhjjjhbgtz2t2c4

Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures

Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen
2018 Sensors  
Therefore, batch signature is suitable for data integration authentication in IoT.  ...  The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time.  ...  When it comes to the environment of IoT, batch signature, which is a variant of conventional digital signature, is a good choice.  ... 
doi:10.3390/s18114056 pmid:30463382 fatcat:nyph4b3qtfanrojq3ivsfcwibq

Energy-Aware Digital Signatures for Embedded Medical Devices [article]

Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia
2019 arXiv   pre-print
Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for auditing and dispute resolution in such IoT applications.  ...  However, digital signatures have been shown to be highly costly for low-end IoT devices, especially when embedded devices (e.g., medical implants) must operate without a battery replacement for a long  ...  . , P l ) that are involved in signature verification.  ... 
arXiv:1903.07786v1 fatcat:va5utsmumbcrpfvndzjmtu72c4

Design and Implementation of an IoT-based Transactional System for Quality Management

Mohammed Issam Younis, Athraa H. Alwan
2021 Iraqi Journal of Science  
Transactions will be stored in an encrypted way at the database to keep them safe from illegal changes. For that, a secure electronic transaction is created with digital signature services.  ...  Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without  ...  Figure 1 - 1 Layers of an IoT-based transactional system. Figure 2 - 2 The digital signature signing scheme. Figure 3 - 3 The digital signature verification process.  ... 
doi:10.24996/ijs.2021.62.2.30 fatcat:mr7xc2lnznck5dmymu7s5aap6u

Consensus Mechanism of IoT Based on Blockchain Technology

Yue Wu, Liangtu Song, Lei Liu, Jincheng Li, Xuefei Li, Linli Zhou, Chaoqun Duan
2020 Shock and Vibration  
To meet the actual needs of IoT, a lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study.  ...  This method can be used in a lightweight IoT system.  ...  Acknowledgments is study was supported by Key Research and Development Plan of Anhui Province (201904a06020056).  ... 
doi:10.1155/2020/8846429 fatcat:fxvprkiqmzbx3l5ho62fim6ynm

Internet of Things Device Identification Algorithm considering User Privacy

Lin Wang, Vijay Kumar
2022 Computational Intelligence and Neuroscience  
It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment.  ...  based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain.  ...  + 1) � 􏽢 x (1) (k + 1) − 􏽢 x (1) (k). ( 8 ) Step 2. e IoT user invokes the group signature algorithm and the Ethereum digital signature algorithm to calculate the group signature and the elliptic curve  ... 
doi:10.1155/2022/6173185 pmid:35510052 pmcid:PMC9061015 fatcat:ur5yt7aj4zewldhv62xclvsxqq

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

2018 KSII Transactions on Internet and Information Systems  
In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device.  ...  Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key.  ...  In order to achieve the trust of the users registered in the general directory, it provides the validity in combination with the digital certificate.  ... 
doi:10.3837/tiis.2018.02.021 fatcat:prjyyr6itvdizpuvmwi5llswge
« Previous Showing results 1 — 15 out of 2,340 results