scholarly journals A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6158 ◽  
Author(s):  
Hisham AlMajed ◽  
Ahmad AlMogren

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.

Author(s):  
Floriano Scioscia ◽  
Michele Ruta ◽  
Giuseppe Loseto ◽  
Filippo Gramegna ◽  
Saverio Ieva ◽  
...  

The Semantic Web and Internet of Things visions are converging toward the so-called Semantic Web of Things (SWoT). It aims to enable smart semantic-enabled applications and services in ubiquitous contexts. Due to architectural and performance issues, it is currently impractical to use existing Semantic Web reasoners. They are resource consuming and are basically optimized for standard inference tasks on large ontologies. On the contrary, SWoT use cases generally require quick decision support through semantic matchmaking in resource-constrained environments. This paper presents Mini-ME, a novel mobile inference engine designed from the ground up for the SWoT. It supports Semantic Web technologies and implements both standard (subsumption, satisfiability, classification) and non-standard (abduction, contraction, covering) inference services for moderately expressive knowledge bases. In addition to an architectural and functional description, usage scenarios are presented and an experimental performance evaluation is provided both on a PC testbed (against other popular Semantic Web reasoners) and on a smartphone.


2014 ◽  
Vol 596 ◽  
pp. 519-527 ◽  
Author(s):  
Tristan Daladier Engouang ◽  
Yun Liu ◽  
Zhen Jiang Zhang

— Scientific researches advancements achieving miniaturization of Micro-electromechanical Systems, has enable smarts autonomous embedded devices know as sensor nodes, that are developed on numerous platforms using the proprietary of hardware and software with capability to communicate wirelessly. Today more than ever these sensors are continuously spreading to civilian usage side of things and in many others applications , including military, security, medical, environments, and animal among others, to sense specific occurrence of desired event and may carried very important data on physical device such as the mica-mote. Hence a plethora of security protocols arises in order to mitigate the risks of malicious attacks such as eavesdrop communications, or data alteration, using cryptographic techniques such as Elliptic curve for data privacy, accuracy, integrity, efficiency, and reducing the energy consumption by mote and processors. We focus on securing data by all means. Hence the in-network processing technique is used to reduce considerably the energy consumption, considering that sensors deployments in inaccessible and resource-constrained environments. After the drawback, we investigate the secured data aggregation and give security requirements that are mandatory to a Trusted Data Aggregation with Low Energy model to satisfy. The security and energy performances are analysed comparing with others methods. Index Terms—TDALE, Aggregation, Elliptic curve, RSA, Security, Energy


Author(s):  
Maria Imdad ◽  
Deden Witarsyah Jacob ◽  
Hairulnizam Mahdin ◽  
Zirawani Baharum ◽  
Shazlyn Milleana Shaharudin ◽  
...  

Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily.  There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of attacks, followed by degree of their severity, affected system components and respective countermeasures. This work will not only give guidelines regarding detection and removal of attacks but will also highlight the impact of these attacks on system, which will be a decision point to safeguard  system from high impact attacks on priority basis.


Symmetry ◽  
2019 ◽  
Vol 11 (11) ◽  
pp. 1386 ◽  
Author(s):  
Insaf Ullah ◽  
Noor Ul Amin ◽  
Mahdi Zareei ◽  
Asim Zeb ◽  
Hizbullah Khattak ◽  
...  

Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sensors to merge with several smart devices to monitor machine status, environment, and collect data from industrial devices. On the other hand, cloud computing provides a good platform for storing crowdsourced data of IIoT. Due to the semi-trusted nature of cloud computing and communication through open channels, the IIoT environment needs security services such as confidentiality and authenticity. One such solution is provided by the identity-based signcryption. Unfortunately, the identity-based signcryption approach suffers from the key escrow problem. Certificateless signcryption is the alternative of identity-based signcryption that can resolve the key escrow problem. Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication overhead. The security and efficiency of the proposed approach are based on the hyper elliptic curve cryptosystem. The hyper elliptic curve is the advance version of the elliptic curve having small parameters and key size of 80 bits as compared to the elliptic curve which has 160-bits key size. Further, we validate the security requirements of our approach through automated validation of Internet security protocols and applications (AVISPA) tool with the help of high level protocol specification language (HLPSL). Moreover, our lightweight and secured scheme will attract low resource devices and will become a perk in the environment of IIoT.


2014 ◽  
Vol 10 (4) ◽  
pp. 77-100 ◽  
Author(s):  
Floriano Scioscia ◽  
Michele Ruta ◽  
Giuseppe Loseto ◽  
Filippo Gramegna ◽  
Saverio Ieva ◽  
...  

The Semantic Web and Internet of Things visions are converging toward the so-called Semantic Web of Things (SWoT). It aims to enable smart semantic-enabled applications and services in ubiquitous contexts. Due to architectural and performance issues, it is currently impractical to use existing Semantic Web reasoners. They are resource consuming and are basically optimized for standard inference tasks on large ontologies. On the contrary, SWoT use cases generally require quick decision support through semantic matchmaking in resource-constrained environments. This paper presents Mini-ME, a novel mobile inference engine designed from the ground up for the SWoT. It supports Semantic Web technologies and implements both standard (subsumption, satisfiability, classification) and non-standard (abduction, contraction, covering) inference services for moderately expressive knowledge bases. In addition to an architectural and functional description, usage scenarios are presented and an experimental performance evaluation is provided both on a PC testbed (against other popular Semantic Web reasoners) and on a smartphone.


2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Manazara Rehman ◽  
Hizbullah Khattak ◽  
Ahmed Saeed Alzahrani ◽  
Insaf Ullah ◽  
Muhammad Adnan ◽  
...  

Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). This paper presents a new concept of CLC to IBC heterogeneous generalized signcryption for the first time to fulfil the prime security requirements of NDN-based IoT. The proposed scheme provides the security properties according to situational needs without disturbing the structural policy of NDN. Considering the resource-constrained nature of IoT, we used a lightweight type of elliptic curve called the hyperelliptic curve cryptosystem which offers the same level of security as that of bilinear pairing and an elliptic curve cryptosystem using a minimum key size. Further, we compare the proposed scheme with recently proposed identity-based as well as certificateless generalized signcryption schemes, and the results give satisfactory outputs in terms of computational and communication resources. Furthermore, we simulate the proposed scheme with Automated Validation of Internet Security Protocols and Applications (AVISPA), and the results show that our scheme is valid and safe. Additionally, we provide a practical scenario of the proposed on NDN with an IoT-based smart city.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
pp. 1-14
Author(s):  
Fen Li ◽  
Oscar Sanjuán Martínez ◽  
R.S. Aiswarya

BACKGROUND: The modern Internet of Things (IoT) makes small devices that can sense, process, interact, connect devices, and other sensors ready to understand the environment. IoT technologies and intelligent health apps have multiplied. The main challenges in the sports environment are playing without injuries and healthily. OBJECTIVE: In this paper the Internet of Things-based Smart Wearable System (IoT-SWS) is introduced for monitoring sports person activity to improve sports person health and performance in a healthy way. METHOD: Wearable systems are commonly used to capture individual sports details on a real-time basis. Collecting data from wearable devices and IoT technologies can help organizations learn how to optimize in-game strategies, identify opponents’ vulnerabilities, and make smarter draft choices and trading decisions for a sportsperson. RESULTS: The experimental result shows that IoT-SWS achieve the highest accuracy of 98.22% and efficient in predicting the sports person’s health to improve sports person performance reliably.


Sign in / Sign up

Export Citation Format

Share Document