{"title":"Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey","authors":"R. M, P. R.","doi":"10.1109/IDCIoT56793.2023.10053412","DOIUrl":null,"url":null,"abstract":"With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"79 1","pages":"122-128"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"物联网技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/IDCIoT56793.2023.10053412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.