{"title":"DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices","authors":"Vidya Rao, Prema K. V.","doi":"10.1049/wss2.12014","DOIUrl":null,"url":null,"abstract":"<p>The fast growth in Internet-of-Things (IoT) applications has increased the number of end-devices communicating over the Internet. As these resource-constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end-to-end security, research efforts have been carried out using elliptic curve cryptography-based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private keys, which are prone to be hacked under intense cryptanalysis. Thereby to increase the security strength the proposed method uses two sets of dynamic elliptic curves for performing digital signature and encryption processes. The method is evaluated on a client-server model using the Raspberry Pi-3 device. Herein, the choice of elliptic curves is made random at the client node and the reference of each elliptic curve is exchanged with the server during the key-exchange process. The choice of elliptic curves is delegated to the client machine to avoid the unwanted delay that would be encounter if server had to choose the curve. This is done because the client senses the data at regular intervals of time and forwards it to the server securely. Experiments were conducted to measure the time taken for hashing function, key generation, signature generation, signature verification, encryption and decryption process. On comparing the proposed DEC-LADE with cBLAKE2b, an improvement was seen at 13.76%, 2.57%, 18.36%, 6.12%, 9.91% and 6.08% less time, respectively, than LWDSA with mBLAKE2b. Theoretical and real-time security evaluations are performed for man-in-the-middle attack, replay attack, and a denial-of-service attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"11 2","pages":"91-109"},"PeriodicalIF":1.5000,"publicationDate":"2021-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12014","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 5
Abstract
The fast growth in Internet-of-Things (IoT) applications has increased the number of end-devices communicating over the Internet. As these resource-constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end-to-end security, research efforts have been carried out using elliptic curve cryptography-based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private keys, which are prone to be hacked under intense cryptanalysis. Thereby to increase the security strength the proposed method uses two sets of dynamic elliptic curves for performing digital signature and encryption processes. The method is evaluated on a client-server model using the Raspberry Pi-3 device. Herein, the choice of elliptic curves is made random at the client node and the reference of each elliptic curve is exchanged with the server during the key-exchange process. The choice of elliptic curves is delegated to the client machine to avoid the unwanted delay that would be encounter if server had to choose the curve. This is done because the client senses the data at regular intervals of time and forwards it to the server securely. Experiments were conducted to measure the time taken for hashing function, key generation, signature generation, signature verification, encryption and decryption process. On comparing the proposed DEC-LADE with cBLAKE2b, an improvement was seen at 13.76%, 2.57%, 18.36%, 6.12%, 9.91% and 6.08% less time, respectively, than LWDSA with mBLAKE2b. Theoretical and real-time security evaluations are performed for man-in-the-middle attack, replay attack, and a denial-of-service attack.
期刊介绍:
IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.