Skip to main content

Elliptic Curves Cryptography for Lightweight Devices in IoT Systems

  • 96 Accesses

Part of the Lecture Notes in Networks and Systems book series (LNNS,volume 405)

Abstract

To protect data confidentiality, cryptographic methods are widely used, however, traditional methods require a higher level of computational resources to achieve a higher level of security. For this reason, ECC (Elliptic Curves Cryptography) is considered as a promising solution. This paper shows a systematic review about ECC methods for IoT systems. Our research questions were related to find out the principal applications of ECC, criteria for implementing ECC and the appropriate elliptic curves for lightweight devices. The papers were collected from Scopus, Science Direct and SpringerLink and after doing the study, we conclude that IoT is the principal application of ECC, the processing time is the most common implementation criteria and the Koblitz elliptic curve over prime fields are accurate for IoT.

Keywords

  • Cryptography
  • IoT
  • Elliptic curve cryptography

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-96043-8_6
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   189.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-96043-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   249.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.

References

  1. Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Elliptic curve lightweight cryptography: a survey. IEEE Access 6, 72514–72550 (2018)

    CrossRef  Google Scholar 

  2. Li, R., Song, T., Capurso, N., Yu, J., Couture, J., Cheng, X.: IoT applications on secure smart shopping system. IEEE Internet Things J. 4(6), 1945–1954 (2017)

    CrossRef  Google Scholar 

  3. Noori, D., Shakeri, H., Niazi Torshiz, M.: Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. Eurasip J. Inf. Secur. 2020(13), 1–11 (2020)

    Google Scholar 

  4. Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference in Advance Computing, Communications and Informatics, ICACCI 2016, pp. 1725–1729 (2016)

    Google Scholar 

  5. Narbayeva, S., Bakibayev, T., Abeshev, K., Makarova, I., Shubenkova, K., Paskevich, A.: Blockchain technology on the way of autonomous vehicles development. Transp. Res. Proc. 44, 168–175 (2020)

    Google Scholar 

  6. Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018)

    CrossRef  Google Scholar 

  7. Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)

    CrossRef  Google Scholar 

  8. Tewari, A., Gupta, B.B.: A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. Int. J. Adv. Intell. Paradigm 9(2–3), 111–121 (2017)

    CrossRef  Google Scholar 

  9. Park, J., Kwon, H., Kang, N.: IoT–Cloud collaboration to establish a secure connection for lightweight devices. Wireless Netw. 23(3), 681–692 (2016). https://doi.org/10.1007/s11276-015-1182-y

    CrossRef  Google Scholar 

  10. Mahto, D., Khan, D.A., Yadav, D.K.: Security analysis of elliptic curve cryptography and RSA. In: Proceeding of the Word Congress on Engineering, WCE 2016, London, U.K, vol. 1 (2016)

    Google Scholar 

  11. Singh, P.K., Vij, P., Vyas, A., Nandi, S.K., Nandi, S.: Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds.) ICDCIT 2019. LNCS, vol. 11319, pp. 422–439. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05366-6_35

    CrossRef  Google Scholar 

  12. Kitchenham, B.A., Charters S.: Guidelines for performing systematic literature reviews in software engineering. EBSE 2007-001. Keele University and Durham University Joint report (2007)

    Google Scholar 

  13. Cano Lengua, M.A., Papa Quiroz, E.A.: A systematic literature review on support vector machines applied to classification. In: Proceedings of the 2020 IEEE Engineering International Research Conference, EIRCON 2020 (2020)

    Google Scholar 

  14. Vargas, P.S.C., Mauricio, D.A.: Review of literature about models and factors of productivity in the software factory. Int. J. Inf. Technol. Syst. Approach 11(1), 48–71 (2018)

    CrossRef  Google Scholar 

  15. Wong, L.R., Mauricio, D., Rodriguez, G.D.: A systematic literature review about software requirements elicitation. J. Eng. Sci. Technol. 12(2), 296–317 (2017)

    Google Scholar 

  16. Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 746–751 (2015)

    Google Scholar 

  17. Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)

    Google Scholar 

  18. Chatzigiannakis, I., Vitaletti, A., Pyrgelis, A.: A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 89–90, 165–177 (2016)

    CrossRef  Google Scholar 

  19. Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for Internet of Things. Perv. Mobile Comput. 42, 15–26 (2017)

    CrossRef  Google Scholar 

  20. Rao, V., Prema, K.V.: Light-weight hashing method for user authentication in Internet-of-Things. Ad Hoc Netw. 89, 97–106 (2019)

    CrossRef  Google Scholar 

  21. Santoso, F.K., Vun, N.C.H.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics, ISCE 2015, pp. 5–6 (2015)

    Google Scholar 

  22. Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst. 49, 104–112 (2015)

    CrossRef  Google Scholar 

  23. Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., Zhou, L.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Depend. Secure Comput. 14(3), 237–248 (2017)

    Google Scholar 

  24. Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953–1966 (2015)

    Google Scholar 

  25. Kavitha, S., Alphonse, P.J.A., Reddy, Y.V.: An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system. J. Med. Syst. 43(8), 1–6 (2019)

    Google Scholar 

  26. Vincent, O.R, Okediran, T., Abayomi-Alli, O.A.: An identity‑based elliptic curve cryptography for mobile payment. SN Comput. Sci. 1, 112 (2020)

    Google Scholar 

  27. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)

    Google Scholar 

  28. SafeCurves Homepage. http://safecurves.cr.yp.to/index.html. Accessed 08 Apr 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Erik Alex Papa Quiroz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Simon Francia, A., Solis-Lastra, J., Papa Quiroz, E.A. (2022). Elliptic Curves Cryptography for Lightweight Devices in IoT Systems. In: Botto-Tobar, M., Cruz, H., Díaz Cadena, A., Durakovic, B. (eds) Emerging Research in Intelligent Systems. CIT 2021. Lecture Notes in Networks and Systems, vol 405. Springer, Cham. https://doi.org/10.1007/978-3-030-96043-8_6

Download citation