Abstract
Internet of Things (IoT) is a thriving technology that interlinks gadgets to the internet by moulding a massive global network of unique objects which possess the capability to gather, process and exchange information to accomplish a specific task. The information is processed intelligently to produce new services; meanwhile, the threat of compromising the device is increasing in parallel. Security plays a vital and challenging factor in the cyber physical system. Implementation of a complex cryptographic algorithm is hard due to its resource constraint nature such as limited storage, computational ability, power constraint, etc. In our proposed prototype, we designed lightweight Elliptic curve cryptography (ECC) based algorithm coupled with a linear congruential method to strengthen the security. To validate the efficiency of our scheme, various experimentations are made and the results are compared in terms of communication and computation overhead. Our proposed method outperforms in the resource constraint environment which provides a highly secure key exchange mechanism and magnificent choice for ECC based key exchange using time-sharing point multiplication.
Similar content being viewed by others
References
Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136. https://doi.org/10.1007/s10916-014-0136-8
Aswathy RH, Malarvizhi N (2018) An investigation on cryptographic algorithms usage in IoT contexts. Int J Eng Technol 7(1.7):10–14. https://doi.org/10.1007/978-3-642-37949-9_54
Banos O, Hervás R (2019) Ubiquitous computing for health applications. J Ambient Intell Human Comput 10:2091–2093. https://doi.org/10.1007/s12652-018-0875-32091-2093
Burleigh S,Cerf VG, Crowcroft J,Tsaoussidis V (2014) Space for internet and internet for space. Ad Hoc Netw 80–86. https://doi.org/https://doi.org/10.1016/j.adhoc.2014.06.005
Chan H, Perrig A, Song D (2003) Random key pre distribution schemes for sensor networks. Symp Security Privacy 197–213.
Distefano S, Merlino G, Puliafito A (2015) A utility paradigm for IoT: the sensing cloud. Pervasive Mob Comput 20:127–144
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security. 41–47. https://doi.org/https://doi.org/10.1145/586110.586117
Evans D (2011) The internet of things: How the next evolution of the internet is changing everything. CISCO white paper.1. 1–11. http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Generat Comput Syst 29(7):1645–1660. https://doi.org/10.1016/j.future.2013.01.010
Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media.
He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consumer Electron 60(1):30–37. https://doi.org/10.1109/TCE.2014.6780922
Holler J, Siatsis V, Mulligan C, Karnouskos S, Avesand S, Boyle D (2014) From machine to the internet of things: introduction to a new age of intelligence. https://doi.org/10.1016/c2012-0-03263-2
Liu CH, Chung YF (2017) Secure user authentication scheme for wireless healthcare sensor networks. Comput Electr Eng 59:250–261
Liu D, Ning P, Li R (2005) Establishing pair wise keys in distributed sensor networks. ACM Trans Inform Syst Security (TISSEC) 8(1):41–77
Mavropoulos O, Mouratidi H, Fish A, Panaousis E (2019) Apparatus: a framework for security analysis in internet of things systems. Ad Hoc Netw 92:101743. https://doi.org/10.1016/j.adhoc.2018.08.013
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad hoc Netw 10(7):1497–1516. https://doi.org/10.1016/j.adhoc.2012.02.016
Suhail NA, Lubega J, Maiga G (2014) Optimization based blended learning framework for constrained bandwidth environment. Adv Comput Sci 3(1):130–139
Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2016) Efficient location privacy algorithm for internet of things (IoT) services and applications. J Netw Comput Appl 89(1): 3–13. ISSN 1084–8045 https://doi.org/https://doi.org/10.1016/j.jnca.2016.10.011
Sunyaev A, Tremmel F, Mauro C, Leimeister JM, Krcmar H (2009) A re-classification of IS security analysis approaches. Assoc Inform Syst.
Trnka M, Cerny T, Stickney N (2018) Survey of authentication and authorization for the internet of things. Security Commun Netw. https://doi.org/10.1155/2018/4351603
Turkanovi M, Hölbl M (2014) Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Wireless Pers Commun 907–922. https://doi.org/10.1007/s11277-013-1543-8
Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321:162–178
Wang K-H, Chen C-M, Fang W, Wu T-Y (2017) A secure authentication scheme for Internet of Things, pervasive mobile computing. Journal homepage: www.elsevier.com/locate/pmc, https://doi.org/10.3966/160792642019072004011
Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput Electr Eng 45:274–285. https://doi.org/10.1016/j.compeleceng.2015.02.015
Xu D, Chen J, Liu Q (2019a) Provably secure anonymous three-factor authentication scheme for multi-server environments. J Ambient Intell Human Comput 10(2):611–627. https://doi.org/10.1007/s12652-018-0710-x
Xu Z, Liu Y, Yen NY (2019b) Special issue on the intelligent sensing on mobile computing and wireless communications. J Ambient Intell Human Comput 10:1679–1680. https://doi.org/10.1007/s12652-018-0752-0
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Aswathy, R.H., Malarvizhi, N. A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT. J Ambient Intell Human Comput 14, 5097–5106 (2023). https://doi.org/10.1007/s12652-020-02788-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02788-0