基于ecc的IoD网络时间戳认证密钥协议算法

S. Samanth, P. V., Mamatha Balachandra
{"title":"基于ecc的IoD网络时间戳认证密钥协议算法","authors":"S. Samanth, P. V., Mamatha Balachandra","doi":"10.1109/DISCOVER55800.2022.9974860","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) networks have advanced and have made the lives of humans much easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory constraints. Both military and civilian applications have used drones or Unmanned Aerial Vehicles (UAVs) over the past several decades. Internet of Drones (IoD) networks are subsets of IoT networks. Drones are resource-constrained devices. Moreover, IoD networks are vulnerable to different security attacks. Hence, 2 RP 3B+ boards are used for the network model to be treated like a drone and a Ground Control Station (GCS) respectively. Moreover, an Authenticated Key-Agreement (AKA) algorithm is designed based on Elliptic Curve Cryptography (ECC). The proposed algorithm has been designed using Python programming language, and the performance metrics analysis is done using Jupyter-Notebook. An idea of integration of timestamps and trigonometric concepts has been introduced to improve the security of the designed ECC-based AKA algorithm. The designed AKA algorithm provides different properties in terms of security, and can also resist some known attacks, as shown by the algorithm’s security analysis. The proposed AKA algorithm’s analysis in terms of performance shows that it outperforms 3 recent related security mechanisms in terms of performance metrics like Total Computation Cost, Total Storage Cost, and Total Communication Cost.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECC-based Authenticated Key-Agreement Algorithm using Time-stamps for IoD networks\",\"authors\":\"S. Samanth, P. V., Mamatha Balachandra\",\"doi\":\"10.1109/DISCOVER55800.2022.9974860\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) networks have advanced and have made the lives of humans much easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory constraints. Both military and civilian applications have used drones or Unmanned Aerial Vehicles (UAVs) over the past several decades. Internet of Drones (IoD) networks are subsets of IoT networks. Drones are resource-constrained devices. Moreover, IoD networks are vulnerable to different security attacks. Hence, 2 RP 3B+ boards are used for the network model to be treated like a drone and a Ground Control Station (GCS) respectively. Moreover, an Authenticated Key-Agreement (AKA) algorithm is designed based on Elliptic Curve Cryptography (ECC). The proposed algorithm has been designed using Python programming language, and the performance metrics analysis is done using Jupyter-Notebook. An idea of integration of timestamps and trigonometric concepts has been introduced to improve the security of the designed ECC-based AKA algorithm. The designed AKA algorithm provides different properties in terms of security, and can also resist some known attacks, as shown by the algorithm’s security analysis. The proposed AKA algorithm’s analysis in terms of performance shows that it outperforms 3 recent related security mechanisms in terms of performance metrics like Total Computation Cost, Total Storage Cost, and Total Communication Cost.\",\"PeriodicalId\":264177,\"journal\":{\"name\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"volume\":\"7 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DISCOVER55800.2022.9974860\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER55800.2022.9974860","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的几十年里,物联网(IoT)网络不断发展,使人类的生活变得更加轻松。树莓派(RP)是一种具有内存限制的物联网设备。在过去的几十年里,军事和民用应用都使用了无人机或无人驾驶飞行器(uav)。无人机互联网(IoD)网络是物联网网络的子集。无人机是资源受限的设备。此外,IoD网络容易受到各种安全攻击。因此,2个RP 3B+板用于网络模型,分别被视为无人机和地面控制站(GCS)。在此基础上,设计了一种基于椭圆曲线密码学(ECC)的认证密钥协议(AKA)算法。采用Python编程语言对算法进行了设计,并使用Jupyter-Notebook进行了性能指标分析。为了提高所设计的基于ecc的AKA算法的安全性,引入了时间戳和三角函数概念的集成思想。设计的AKA算法在安全性方面提供了不同的特性,并且可以抵抗一些已知的攻击,从算法的安全性分析可以看出。所提出的AKA算法在性能方面的分析表明,它在总计算成本、总存储成本和总通信成本等性能指标方面优于最近3种相关的安全机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
ECC-based Authenticated Key-Agreement Algorithm using Time-stamps for IoD networks
Internet of Things (IoT) networks have advanced and have made the lives of humans much easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory constraints. Both military and civilian applications have used drones or Unmanned Aerial Vehicles (UAVs) over the past several decades. Internet of Drones (IoD) networks are subsets of IoT networks. Drones are resource-constrained devices. Moreover, IoD networks are vulnerable to different security attacks. Hence, 2 RP 3B+ boards are used for the network model to be treated like a drone and a Ground Control Station (GCS) respectively. Moreover, an Authenticated Key-Agreement (AKA) algorithm is designed based on Elliptic Curve Cryptography (ECC). The proposed algorithm has been designed using Python programming language, and the performance metrics analysis is done using Jupyter-Notebook. An idea of integration of timestamps and trigonometric concepts has been introduced to improve the security of the designed ECC-based AKA algorithm. The designed AKA algorithm provides different properties in terms of security, and can also resist some known attacks, as shown by the algorithm’s security analysis. The proposed AKA algorithm’s analysis in terms of performance shows that it outperforms 3 recent related security mechanisms in terms of performance metrics like Total Computation Cost, Total Storage Cost, and Total Communication Cost.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信