USING ELLIPTIC CURVE CRYPTOGRAPHY FOR AUTHENTICATION AND KEY EXCHANGE IN CONSTRAINED INTERNET OF THINGS NETWORKS

Author:

Karataş İbrahim1ORCID,Bayraklı Selim2ORCID

Affiliation:

1. MALTEPE ÜNİVERSİTESİ, FEN BİLİMLERİ ENSTİTÜSÜ

2. MİLLİ SAVUNMA ÜNİVERSİTESİ, HAVA HARP OKULU, BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ, BİLGİSAYAR MÜHENDİSLİĞİ PR.

Abstract

It is anticipated that billions of objects will be interconnected with the rise of the Internet of Things, leading to the evolution of the Internet for the upcoming generation. Various applications have been created in different sectors such as health, logistics, industry, and military in recent years. The techniques created for IoT are still in a nascent stage and encounter numerous hurdles. The primary concern is the security issue. These devices are a significant target due to the numerous conveniences offered by the Internet of Things. These gadgets will maintain continuous communication with one other (M2M) and with people (M2H). It is crucial to ensure the safe transmission of key information about people and the environment throughout this communication. Today's security approaches cannot be integrated into Internet of Things networks because of constraints such as limited RAM, ROM ratio, low bandwidth, poor computing power, and low energy supply. The DTLS protocol, created by IETF, utilizes symmetric encryption and may not be suitable for Class-0 and Class-1 devices that require asymmetric encryption. This study examines the security measures in place and the data is securely exposed to the internet using Elliptic Curve Cryptography, then compared with other studies.

Publisher

Istanbul Ticaret Universitesi

Reference25 articles.

1. Aazam, M., St-Hilaire, M., Lung, C.-H., & Lambadaris, I. (2016). PRE-Fog: IoT trace based probabilistic resource estimation at Fog. 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

2. Aloul, F., Zualkernan, I., & Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. 10th International Conference for Internet Technology and Secured Transactions (ICITST), (336-341). Londra.

3. Bergmann, O. (2017). Eclipse tinydtls. Retrieved February 10, 2024 from Eclipse Foundation: https://projects.eclipse.org/projects/iot.tinydtls

4. Bormann, C., Ersue, M., & Keranen, A. (2014). Terminology for Constrained-Node Networks. Internet Engineering Task Force (IETF).

5. Bozkurt, Ö. (2005). Eliptik Eğri Şifreleme Kullanarak Güvenli Soket Katmanı Protokolünün Gerçeklemesi ve Performansının Değerlendirilmesi. [Yüksek Lisans Tezi]. İstanbul: Yıldız Teknik Üniversitesi Fen Bilimleri Enstitüsü, İstanbul.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3