A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Internet of Things: Impact of IoT in Business Environment and Challenges in Secure Implementation
2020
International journal of recent technology and engineering
This paper highlights that how IoT may introduce the better opportunities in business and challenges of secure IoT connection and while communicating the IoT device. ...
In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication. ...
Digital signature verification time comparison. ...
doi:10.35940/ijrte.b3949.079220
fatcat:5d2kop5y4zgwtcmmqnsredavju
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
[article]
2021
arXiv
pre-print
Taking the open-source implementation of SUIT available in RIOT as a case study, we overview post-quantum considerations, and quantum-resistant digital signatures in particular, focusing on lowpower, microcontroller-based ...
IoT devices which have stringent resource constraints in terms of memory, CPU, and energy consumption. ...
These schemes offer fast signing and verification, at the cost of relatively large signatures. Multivariate signatures. ...
arXiv:2106.05577v2
fatcat:pcg64enerzgqhe3qw6ime2vksi
ARIS: Authentication for Real-Time IoT Systems
[article]
2020
arXiv
pre-print
In this paper, we propose a new signature scheme called ARIS that pushes the limits of the existing digital signatures, wherein commodity hardware can verify 83,333 signatures per second. ...
Although some fast authentication techniques have been proposed, some of them might not fully meet the needs of the emerging delay-aware IoT. ...
This work is supported by the Department of Energy award DE-OE0000780 and NSF award #1652389. ...
arXiv:1903.02142v2
fatcat:otnx34ssgvdx3ckvl26akrbmhe
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
2020
Symmetry
The internet of things (IoT) technology, on the other hand, has become the main driver of the fourth industrial revolution, and is currently utilized in diverse fields of industry. ...
New approaches have been established through improving the authentication methods in the blockchain to address the constraints of scalability and protection in IoT operating environments of distributed ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym12101699
fatcat:jio7qfvlcjamle3jwprobsgwb4
BlockTrack-L: A Lightweight Blockchain-based Provenance Message Tracking in IoT
2020
International Journal of Advanced Computer Science and Applications
Data tracking is of great significance and a central part in digital forensics. ...
In maintaining an audit trail of IoT devices or provenance of IoT device data, it is important to know the origins of requests to ensure certain level of trust in IoT data. ...
of digital signature by outsourcing the mechanism to the Edge nodes. ...
doi:10.14569/ijacsa.2020.0110462
fatcat:7kzn4kb7m5gmbmajrois22bkum
A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security
2019
Energies
There are also many security vulnerabilities in the sensor multi-platform from the IoT point of view. ...
This technology is used in Machine-to-Machine (M2M) access payment—KYD (Know Your Device)—based on the reliability of existing IoT devices. ...
of long-term verification of the digital signature. ...
doi:10.3390/en12030402
fatcat:vezgp3kgebaozaocsyu55lwd2y
Secure Firmware Updates for Constrained IoT Devices using Open Standards: A Reality Check
2019
IEEE Access
While the IoT deployments multiply in a wide variety of verticals, the most IoT devices lack a built-in secure firmware update mechanism. ...
We evaluate the performance of our implementation on a variety of commercial off-the-shelf constrained IoT devices. ...
For instance, recent work on hyperelliptic curves includes qDSA [54] , a signature scheme that yields fast signatures and verifications for constrained IoT devices. ...
doi:10.1109/access.2019.2919760
fatcat:64plretunrg3xdqkxvefdr4qxu
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
2013
IEEE Sensors Journal
Security is very important for Internet of Things (IoTs). ...
In this paper, we revise the original Nyberg's fast one-way accumulator and construct a lightweight multicast authentication mechanism for small scale IoT applications. ...
., only dozens of receivers), the computation overhead is much lower than that of digital signature. In addition, logical multiplication and bits mapping are all simple bit operations in nature. ...
doi:10.1109/jsen.2013.2266116
fatcat:wj5dsu742ndr5cdc2uzm5nqnem
Smart Home - Application using HTTP/MQTT as Communication Protocols
[article]
2021
Zenodo
Additionally, intent authentication over HTTP is based on digital signature that is demonstrated using RSA (encryption) and MD5 (hashing) when the system is deployed in insecure environment(s). ...
This study discloses the development of a solution for realizing a smart home in the post COVID-19 era using the Internet of Things domain knowledge. ...
Digital signature based intent verification (for security on HTTP protocol) c. ...
doi:10.5281/zenodo.5791697
fatcat:jmamvim7rramhjjjhbgtz2t2c4
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures
2018
Sensors
Therefore, batch signature is suitable for data integration authentication in IoT. ...
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time. ...
When it comes to the environment of IoT, batch signature, which is a variant of conventional digital signature, is a good choice. ...
doi:10.3390/s18114056
pmid:30463382
fatcat:nyph4b3qtfanrojq3ivsfcwibq
Energy-Aware Digital Signatures for Embedded Medical Devices
[article]
2019
arXiv
pre-print
Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for auditing and dispute resolution in such IoT applications. ...
However, digital signatures have been shown to be highly costly for low-end IoT devices, especially when embedded devices (e.g., medical implants) must operate without a battery replacement for a long ...
. , P l ) that are involved in signature verification. ...
arXiv:1903.07786v1
fatcat:va5utsmumbcrpfvndzjmtu72c4
Design and Implementation of an IoT-based Transactional System for Quality Management
2021
Iraqi Journal of Science
Transactions will be stored in an encrypted way at the database to keep them safe from illegal changes. For that, a secure electronic transaction is created with digital signature services. ...
Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without ...
Figure 1 - 1 Layers of an IoT-based transactional system.
Figure 2 - 2 The digital signature signing scheme.
Figure 3 - 3 The digital signature verification process. ...
doi:10.24996/ijs.2021.62.2.30
fatcat:mr7xc2lnznck5dmymu7s5aap6u
Consensus Mechanism of IoT Based on Blockchain Technology
2020
Shock and Vibration
To meet the actual needs of IoT, a lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study. ...
This method can be used in a lightweight IoT system. ...
Acknowledgments is study was supported by Key Research and Development Plan of Anhui Province (201904a06020056). ...
doi:10.1155/2020/8846429
fatcat:fxvprkiqmzbx3l5ho62fim6ynm
Internet of Things Device Identification Algorithm considering User Privacy
2022
Computational Intelligence and Neuroscience
It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. ...
based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. ...
+ 1) � x (1) (k + 1) − x (1) (k). ( 8 ) Step 2. e IoT user invokes the group signature algorithm and the Ethereum digital signature algorithm to calculate the group signature and the elliptic curve ...
doi:10.1155/2022/6173185
pmid:35510052
pmcid:PMC9061015
fatcat:ur5yt7aj4zewldhv62xclvsxqq
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments
2018
KSII Transactions on Internet and Information Systems
In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. ...
Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. ...
In order to achieve the trust of the users registered in the general directory, it provides the validity in combination with the digital certificate. ...
doi:10.3837/tiis.2018.02.021
fatcat:prjyyr6itvdizpuvmwi5llswge
« Previous
Showing results 1 — 15 out of 2,340 results