733 Hits in 5.8 sec


2022 Zenodo  
Cryptographic smart card security is very crucial element in almost all financial, healthcare organizations.  ...  Hence, this paper presents the device to device communication strategy where every smart card and card reader supports MQTT protocol.  ...  In this paper, author proposed an authentication scheme with key agreement on elliptic curve cryptography (ECC) [10] .  ... 
doi:10.5281/zenodo.6997861 fatcat:fkgfchg5bvdobbkdcjuj263bki

Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey

and Fahmi Khalifa 2 Ali E. Takieldeen1
2021 Zenodo  
acceleration engine has been implemented for lightweight authentication based on elliptic curve cryptography.  ...  results related to the lightweight authentication based on the elliptical curve as its basic cryptography algorithm.  ... 
doi:10.5281/zenodo.5301586 fatcat:5gtplqi7e5asrhi56kjre23n7a


T Daisy Premila Bai .
2016 International Journal of Research in Engineering and Technology  
of the underlying technologies in a smart environment with one IoT enabled User Adaptable Intelligent Smart Card ( UAISC) through mobile devices.  ...  Elliptic Curve Cryptography (ECC) is used to ensure complete protection against the security risks such as confidentiality, integrity, privacy and unique authentication.  ...  Elliptic Curve Cryptography Ankita et al., [28] have said that ECC is widely used in devices which has less storage memory especially popularly employed in smart cards.  ... 
doi:10.15623/ijret.2016.0505030 fatcat:3ndqczn5yrbnnpnl4pqqsmoyee

A comprehensive taxonomy of security and privacy issues in RFID

Atul Kumar, Ankit Kumar Jain, Mohit Dua
2021 Complex & Intelligent Systems  
Then, taxonomy of various security schemes, to deal with these attacks, is discussed under the criteria cryptography approaches, privacy, authentication, authorization, and availability.  ...  First, the works presents the architecture of IoT in detail. Second, all possible attacks are described by categorizing them into confidentiality, integrity, and availability.  ...  However, the ECC-based scheme may suffer from fault attack on the smart card [54] .  ... 
doi:10.1007/s40747-021-00280-6 fatcat:vqaowzxtwrh6hjaio6nmfzjay4


A.Vithya Vijayalakshmi
2017 International Journal of Advanced Research in Computer Science  
In this approach the data sensed from the IoT devices are encrypted in the gateway using Merkle-Hellman encryption and Elliptic Curve Cryptography(ECC) to ensure the security of the data.  ...  Internet of Things (IoT) plays a vital role in the field of Information Technology, Industries and Healthcare etc.  ...  [9] proposed Elliptic Curve Cryptography based security framework for Internet of Things and Cloud Computing.This model adopted multifactor authentication which worked in seven phases.  ... 
doi:10.26483/ijarcs.v8i9.4959 fatcat:c2v4a3smdnfu7g2ks67cakk3b4

Novel Technique for Securing IoT Systems by using Multiple ECC and Ceaser Cipher Cryptography

Ramakrishna Hegde, Soumyasri S M
2021 International journal of computer science and mobile computing  
Alternatively, Diffie-Hellman (DH) and Multi Curve Elliptic Curve Cryptography (ECC) supplement the privacy schemes, basically in asymmetric cryptography.  ...  Current cryptographic models and security schemes are based on widely adopted encryption algorithms, and privacy standards.  ...  Elliptic Curve Cryptography is a promising asymmetric cryptographic algorithm with an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields [1] .  ... 
doi:10.47760/ijcsmc.2021.v10i02.001 fatcat:zlk3bannivbcpjczbudpva5dru

Secured Authentication Systems for Internet of Things

Gowtham M, M. Banga, Mallanagouda Patil
2018 EAI Endorsed Transactions on Smart Cities  
It is one of the progressing and confirmed employments of Internet of Things (IoT). OBJECTIVES: The presented research manuscript is presenting an outline of the present state of IoT security.  ...  The developments of IoT are by and by spread to the entire sphere by which there is superb system in the devices related using IoT.  ...  [38] Prescribed ECC based RFID Authentication Schemes for Internet of Things in Healthcare Environment with Elliptic Curve Cryptography. Further enhancement of ECC can be done. al.  ... 
doi:10.4108/eai.13-7-2018.163998 fatcat:ljhljurqx5gqjn62wpws7wdlaq

Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey

Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi, Muzafer Saračević
2021 Acta Polytechnica Hungarica  
This paper presents an analytical and comprehensive survey of various remote user authentication techniques and categorizes them based on different applications.  ...  Secure remote user authentication is an authentication technique in which the remote server authorizes the identity of the user through an insecure communication network.  ...  The M2M authentication protocol they have developed is based on Elliptic Curve Cryptography RFID systems.  ... 
doi:10.12700/aph.18.3.2021.3.5 fatcat:z6m33sofgngg3e4xr2zwfxm5ta

Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4

Fatimah Alkhudhayr, Tarek Moulahi, Abdulatif Alabdulatif
2021 International Journal of Advanced Computer Science and Applications  
This paper describes the application of elliptic curve cryptography (ECC) in a simulated IoT environment to ensure the confidentiality of data passed between the connected devices.  ...  In the study outlined in this paper, scalar multiplication was implemented on Raspberry Pi4 and processing time and consumed energy were measured to compare the performance.  ...  Elliptic Curve Cryptography (ECC), proposed by Miller and Koblitz in 1985, is among the most popular cryptography protocols [5] .  ... 
doi:10.14569/ijacsa.2021.0120954 fatcat:itxxcbki2vak3duaw5ee26q25u

Internet of Things Security: Challenges and Key Issues

Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, Ambrina Kanwal, Habib Ullah Khan
2021 Security and Communication Networks  
Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT  ...  Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices.  ...  Table 2 : 2 Classification of some IoT authentication schemes. ECC: elliptic curve cryptography; AES: Advanced Encryption Standard; OTP: one time password; WSN: wireless sensor network.  ... 
doi:10.1155/2021/5533843 fatcat:st6oaryrtfgthh5evf6343kkve

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
But in recent years, ubiquitous deployment of some tools and technologies has raised several concerns related to the privacy and security in IoT enabled smart environment.  ...  Smart devices and IoT applications have been widely used in many fields of social living, social production, home and industrial automation which have made people's life efficient and convenient.  ...  Won-il Bae and Jin Kwak (2017) proposed smart card based secure authentication protocol in multi-server IoT based environment.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Mai Trung Dong, Xianwei Zhou
2016 OALib  
Elliptic Curve Cryptography (ECC) and decoy technology in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency.  ...  and Actuator Networks, Decentralized Smart Building Control, IoT and Cyber-physical systems and software defined networks, and reviews Comprehensive Approach for security Data Theft Attack the use of  ...  Smart Cards are one of the most popular devices for the use of ECC. Many manufacturing companies are producing smart cards that make use of elliptic curve digital signature algorithms.  ... 
doi:10.4236/oalib.1102802 fatcat:hntozyqqnzgmbiiq6jwqw5lbea

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

Anuj Kumar Singh, Arun Solanki, Anand Nayyar, Basit Qureshi
2020 Applied Sciences  
In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of  ...  The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison  ...  In the Section 4 of the paper, an elliptic curve signcryption based mutual authentication protocol for smart cards has been developed.  ... 
doi:10.3390/app10228291 fatcat:hrax7ytuozbtzlfzlxbyri3iba

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer
2019 Journal of Computer Networks and Communications  
Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains.  ...  User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely.  ...  For instance, in wireless sensor networks, they are based on elliptic curve cryptography [12] , self-certified keys cryptosystem [13] , and hash functions [14] .  ... 
doi:10.1155/2019/5747136 fatcat:dps6x5rtlrgznhi5rjuv4dtlji

Multifactor Authentication and Key Management Protocol for WSN-assisted IoT Communication

Tabassum Ara, M. Prabhakar
2019 Journal of Telecommunications and Information Technology  
In this paper a novel multi-factor authentication protocol for IoT applications, relying on enhanced Rabinassisted elliptic curve cryptography, biometric features and time stamping methods, is developed  ...  An NS2 simulation-based performance assessment has revealed that the multifactor authentication and key management models we have proposed are capable of not only avoiding security breaches, such as smart  ...  [24] developed a lightweight authentication and secured routing (LASeR) method for named data networks (NDN) used in smart city IoT applications.  ... 
doi:10.26636/jtit.2019.134019 fatcat:cnzzq4helvfe5d3b26j5nhhdxi
« Previous Showing results 1 — 15 out of 733 results