Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things

被引:16
作者
Abdaoui, Abderrazak [1 ]
Erbad, Aiman [2 ]
Al-Ali, Abdulla Khalid [1 ]
Mohamed, Amr [1 ]
Guizani, Mohsen [1 ]
机构
[1] Qatar Univ, Coll Engn, Comp Sci & Engn Dept, Doha, Qatar
[2] Hamad Bin Khalifa Univ, Qatar Fdn, Coll Sci & Engn, Div Informat & Comp Technol, Doha, Qatar
关键词
Cryptography; elliptic curve cryptography (ECC); fuzzy logic; Internet of Things (IoT); pollard's rho; pseudorandom numbers; ECC;
D O I
10.1109/JIOT.2021.3121350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy, and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for IoT systems. In this article, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests, such as: frequency test, frequency test with mono block, run test, discrete Fourier transform (DFT) test, and advanced DFT test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms, such as Pollard's $\rho $ and Baby-step Giant-step, to evaluate the vulnerability of the proposed scheme.
引用
收藏
页码:9987 / 9998
页数:12
相关论文
共 45 条
[1]   Surveillance using non-stealthy sensors: A new intruder model [J].
Bagchi, Amitabha ;
Kalayappan, Rajshekar ;
Sankhla, Surabhi .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :1900-1911
[2]  
Balasch J., 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, P105, DOI 10.1109/FDTC.2011.9
[3]  
Bassham L., 2010, NIST SP
[4]  
Bekkers R., 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, DOI 10.1109/FDTC.2011.20
[5]   Selecting elliptic curves for cryptography: an efficiency and security analysis [J].
Bos, Joppe W. ;
Costello, Craig ;
Longa, Patrick ;
Naehrig, Michael .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) :259-286
[6]  
Brauer W., 1990, MONOGRAPHS THEORETIC
[7]   Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J].
Butun, Ismail ;
Osterberg, Patrik ;
Song, Houbing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :616-644
[8]  
Carracedo JM, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, P23, DOI 10.1109/IoTSMS.2018.8554634
[9]  
Cervesato I., 2001, PROC 16 ANN S LOGIC, V1
[10]   Modeling of Man-in-the-Middle Attack in the Wireless Networks [J].
Chen, Zhe ;
Guo, Shize ;
Zheng, Kangfeng ;
Yang, Yixian .
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, :2255-2258