Cargando…

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable comput...

Descripción completa

Detalles Bibliográficos
Autores principales: AlMajed, Hisham, AlMogren, Ahmad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7662995/
https://www.ncbi.nlm.nih.gov/pubmed/33138018
http://dx.doi.org/10.3390/s20216158
_version_ 1783609524218757120
author AlMajed, Hisham
AlMogren, Ahmad
author_facet AlMajed, Hisham
AlMogren, Ahmad
author_sort AlMajed, Hisham
collection PubMed
description Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.
format Online
Article
Text
id pubmed-7662995
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-76629952020-11-14 A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things AlMajed, Hisham AlMogren, Ahmad Sensors (Basel) Article Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge. MDPI 2020-10-29 /pmc/articles/PMC7662995/ /pubmed/33138018 http://dx.doi.org/10.3390/s20216158 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
AlMajed, Hisham
AlMogren, Ahmad
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title_full A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title_fullStr A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title_full_unstemmed A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title_short A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
title_sort secure and efficient ecc-based scheme for edge computing and internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7662995/
https://www.ncbi.nlm.nih.gov/pubmed/33138018
http://dx.doi.org/10.3390/s20216158
work_keys_str_mv AT almajedhisham asecureandefficienteccbasedschemeforedgecomputingandinternetofthings
AT almogrenahmad asecureandefficienteccbasedschemeforedgecomputingandinternetofthings
AT almajedhisham secureandefficienteccbasedschemeforedgecomputingandinternetofthings
AT almogrenahmad secureandefficienteccbasedschemeforedgecomputingandinternetofthings