Skip to main content

Advertisement

Log in

Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet based services in IoT environments. As IoT environment connected to heterogeneous network, they become vulnerable to attacks and hence it is required for secured mechanism for data transfer. Moreover, when secured cryptographic algorithms are employed in mobile phones, battery consumption plays a major role. The IoT environment associated with proposed algorithm can be used to interlink humans and enable the use of a communication channel to bring forth inter machine interaction. The encryption procedures used here makes sure that the major concerns of authentication uniqueness, confidentiality and privacy of the users are maintained. This implies that the users and the service providers can implement the system security measures that have been proposed. Research is still being conducted to improve the architecture and implementation strategies in a real time environment. In order to solve those issues, this paper proposes a novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time. The performance evaluation with the key size of 14 and 16 bits reveals that the proposed algorithm can be fast and saves the battery life than the other conventional ECC algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)

    Article  Google Scholar 

  2. Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017)

  3. Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016)

  4. Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016)

  5. Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016)

    Google Scholar 

  6. Xu, Q., Wu, J., Chen, Q.: A novel mobile personalized recommended method based on money flow model for stock exchange. Math. Probl. Eng. https://doi.org/10.1155/2014/353910 (2014)

  7. Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://www.irjet.net/. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016)

  8. Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016)

  9. Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016)

  10. Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://www.jatit.org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016)

  11. Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015)

    Google Scholar 

  12. Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014)

    Google Scholar 

  13. Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014)

  14. Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014)

    Google Scholar 

  15. Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014)

    Google Scholar 

  16. Toldinas, J., Damasevicius, R., Venckauskas, A., Blazauskas, T., Ceponis, J.: Energy consumption of cryptographic algorithms in mobile devices. Elektron. Elektrotech. 20(5), 158–161 (2014). https://doi.org/10.5755/j01.eee.20.5.7118

    Article  Google Scholar 

  17. Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013)

  18. Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012)

  19. Damasevicius, R., Ziberkas, G., Stuikys, V., Toldinas, J.: Energy consumption of hash functions. Elektron. Elektrotech. 18(10), 81–84 (2012). https://doi.org/10.5755/j01.eee.18.10.3069

    Article  Google Scholar 

  20. Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011)

  21. Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010)

  22. Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sathish Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, K.S., Sukumar, R. Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments. Cluster Comput 22 (Suppl 5), 12021–12028 (2019). https://doi.org/10.1007/s10586-017-1542-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1542-8

Keywords

Navigation