Skip to main content

An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home

  • Conference paper
  • First Online:
Proceedings of the International Conference on Big Data, IoT, and Machine Learning

Abstract

The Internet of Things (IoT) is one of the emerging fields of technology, which allows the appliance of Smart Home to connect via the internet for communicating and sharing data between them. However, ensuring the security of IoT devices is challenging for their processing and power consumption. IoT devices are resource-constrained, and traditional encryption algorithms are computationally expensive for these small-size and low-powered devices. In this research, an efficient and effective lightweight cryptographic scheme is presented for securing communication between IoT Home devices based on Elliptic Curve Cryptography (ECC). It ensures complete protection against security risks such as authentication, confidentiality, integrity, and key agreement and protects against common cyber attacks. We have conducted an experimental evaluation to demonstrate that the proposed method can outperform the state-of-the-art cryptographic techniques, which significantly improves the security and reduces the storage and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aldossari M, Sidorova A (2018) Consumer acceptance of internet of things (IoT): smart home context. J Comput Inf Syst 60:1–11. https://doi.org/10.1080/08874417.2018.1543000 Nov

    Article  Google Scholar 

  2. Mohammed H, Qayyum M (2017) Internet of things: a study on security and privacy threats, Mar 2017. https://doi.org/10.1109/Anti-Cybercrime.2017.7905270

  3. Daisy Bai T, Raj K, Rabara S (2017) Elliptic curve cryptography based security framework for internet of things (IoT) enabled smart card, Feb 2017, pp 43–46. https://doi.org/10.1109/WCCCT.2016.20

  4. Pham C, Nguyen T, Dang T (2019) Resource-constrained IoT authentication protocol: an ECC-based hybrid scheme for device-to-server and device-to-device communications, Nov 2019, pp 446–466. ISBN: 978-3-030-35652-1. https://doi.org/10.1007/978-3-030-35653-8_30

  5. Sarmah R, Bhuyan M, Bhuyan M (2019) SURE-H: a secure IoT enabled smart home system, Apr 2019, pp 59–63. https://doi.org/10.1109/WF-IoT.2019.8767229

  6. Chowdhury S et al (2019) IoT based smart security and home automation system, Oct 2019, pp 1158–1161. https://doi.org/10.1109/UEMCON47517.2019.8992994

  7. Singh A, Gupta D, Mittal N (2019) Enhancing home security systems using IoT, June 2019, pp 133–137. https://doi.org/10.1109/ICECA.2019.8821833

  8. Vasudev H et al (2020) A lightweight mutual authentication protocol for V2V communication in internet of vehicles. IEEE Trans Veh Technol 69(6):6709–6717

    Google Scholar 

  9. Garg S et al (2019) Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans Ind Inform 1. https://doi.org/10.1109/TII.2019.2944880

  10. Kumar A, Kumar P, Agrawal R (2019) A face recognition method in the IoT for security appliances in smart homes, offices and cities, Mar 2019, pp 964–968. https://doi.org/10.1109/ICCMC.2019.8819790

  11. Raju KL et al (2019) Home automation and security system with node MCU using internet of things, Mar 2019, pp 1–5. https://doi.org/10.1109/ViTECoN.2019.8899540

  12. Tewari A, Gupta B (2018) A mutual authentication protocol for IoT devices using elliptic curve cryptography, Jan 2018, pp 716–720. https://doi.org/10.1109/CONFLUENCE.2018.8442962

  13. Jiang R et al (2013) EAP-based group authentication and key agreement protocol for machine-type communications. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/304601

  14. Ray S, Biswas G (2012) Establishment of ECC-based initial secrecy usable for IKE implementation, July 2012

    Google Scholar 

  15. Liao Y-P, Hsiao C-M (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw 18:133–146. https://doi.org/10.1016/j.adhoc.2013.02.004 July

    Article  Google Scholar 

  16. Abi-Char P, M’Hamed A, ElHassan B (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications, Oct 2007, pp 235–240. ISBN: 978-0-7695-2878-6. https://doi.org/10.1109/NGMAST.2007.4343427

Download references

Acknowledgements

The authors thank the Department of Computer Science and Engineering of the University of Asia Pacific, Dhaka, Bangladesh, and the Institute of Automation Research and Engineering, Dhaka, Bangladesh to support this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. S. M. Touhidul Hasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Islam, T., Youki, R.A., Chowdhury, B.R., Hasan, A.S.M.T. (2022). An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home. In: Arefin, M.S., Kaiser, M.S., Bandyopadhyay, A., Ahad, M.A.R., Ray, K. (eds) Proceedings of the International Conference on Big Data, IoT, and Machine Learning. Lecture Notes on Data Engineering and Communications Technologies, vol 95. Springer, Singapore. https://doi.org/10.1007/978-981-16-6636-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6636-0_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6635-3

  • Online ISBN: 978-981-16-6636-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics