Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things

被引:9
作者
Harbi, Yasmine [1 ]
Aliouat, Zibouda [1 ]
Harous, Saad [2 ]
Bentaleb, Abdelhak [3 ]
机构
[1] Ferhat Abbas Univ Setif1, Comp Sci Dept, LRSD Lab, Setif, Algeria
[2] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[3] Natl Univ Singapore, Singapore, Singapore
来源
MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS | 2019年 / 64卷
关键词
Security; Privacy; Wireless Sensor Networks; Security requirements; Security attacks;
D O I
10.1007/978-3-030-05481-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has made extraordinary progress in human lives from healthcare applications to daily chores. The IoT enables everyday object to be connected to the Internet. These devices are embedded with sensors and actuators in order to collect and share data. However, the transmission of the collected data may face several security and privacy concerns. To overcome this problem, we propose a Secure Data Transmission Scheme (SDTS) that improves communication security in cluster-based Wireless Sensor Networks (WSNs). The SDTS is based on Elliptic Curve Cryptography (ECC) due to its ability to provide high security level with small key size. The proposed method achieves several security requirements including confidentiality, integrity, and authentication. Moreover, it resists different security attacks like brute force attack, replay attack, and sinkhole attack. The performance analysis shows that SDTS is relatively efficient in term of communication cost.
引用
收藏
页码:34 / 46
页数:13
相关论文
共 24 条
  • [1] [Anonymous], 2004, Guide to Elliptic Curve Cryptography, DOI DOI 10.1007/0-387-21846-73
  • [2] [Anonymous], 2007, Wireless sensor networks: technology, protocols, and applications
  • [3] [Anonymous], 2017, INT J COMPUT APPL
  • [4] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [5] Azzabi Tarek, 2017, 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET). Proceedings, P66, DOI 10.1109/ASET.2017.7983668
  • [6] A survey of lightweight-cryptography implementations
    Eisenbarth, Thomas
    Kumar, Sandeep
    Paar, Christof
    Poschmann, Axel
    Uhsadel, Leif
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533
  • [7] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [8] Internet of Things (IoT): A vision, architectural elements, and future directions
    Gubbi, Jayavardhana
    Buyya, Rajkumar
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660
  • [9] Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
  • [10] Challenges and research directions for Internet of Things
    Hammoudi, Sarra
    Aliouat, Zibouda
    Harous, Saad
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (02) : 367 - 385