Abstract
In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet based services in IoT environments. As IoT environment connected to heterogeneous network, they become vulnerable to attacks and hence it is required for secured mechanism for data transfer. Moreover, when secured cryptographic algorithms are employed in mobile phones, battery consumption plays a major role. The IoT environment associated with proposed algorithm can be used to interlink humans and enable the use of a communication channel to bring forth inter machine interaction. The encryption procedures used here makes sure that the major concerns of authentication uniqueness, confidentiality and privacy of the users are maintained. This implies that the users and the service providers can implement the system security measures that have been proposed. Research is still being conducted to improve the architecture and implementation strategies in a real time environment. In order to solve those issues, this paper proposes a novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time. The performance evaluation with the key size of 14 and 16 bits reveals that the proposed algorithm can be fast and saves the battery life than the other conventional ECC algorithms.
Similar content being viewed by others
References
Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)
Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017)
Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016)
Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016)
Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016)
Xu, Q., Wu, J., Chen, Q.: A novel mobile personalized recommended method based on money flow model for stock exchange. Math. Probl. Eng. https://doi.org/10.1155/2014/353910 (2014)
Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://www.irjet.net/. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016)
Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016)
Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016)
Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://www.jatit.org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016)
Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015)
Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014)
Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014)
Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014)
Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014)
Toldinas, J., Damasevicius, R., Venckauskas, A., Blazauskas, T., Ceponis, J.: Energy consumption of cryptographic algorithms in mobile devices. Elektron. Elektrotech. 20(5), 158–161 (2014). https://doi.org/10.5755/j01.eee.20.5.7118
Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013)
Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012)
Damasevicius, R., Ziberkas, G., Stuikys, V., Toldinas, J.: Energy consumption of hash functions. Elektron. Elektrotech. 18(10), 81–84 (2012). https://doi.org/10.5755/j01.eee.18.10.3069
Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011)
Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010)
Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, K.S., Sukumar, R. Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments. Cluster Comput 22 (Suppl 5), 12021–12028 (2019). https://doi.org/10.1007/s10586-017-1542-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1542-8