解决智能应用中安全问题的轻量级加密方法:综述

R. M, P. R.
{"title":"解决智能应用中安全问题的轻量级加密方法:综述","authors":"R. M, P. R.","doi":"10.1109/IDCIoT56793.2023.10053412","DOIUrl":null,"url":null,"abstract":"With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"79 1","pages":"122-128"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey\",\"authors\":\"R. M, P. R.\",\"doi\":\"10.1109/IDCIoT56793.2023.10053412\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.\",\"PeriodicalId\":60583,\"journal\":{\"name\":\"物联网技术\",\"volume\":\"79 1\",\"pages\":\"122-128\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"物联网技术\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/IDCIoT56793.2023.10053412\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"物联网技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/IDCIoT56793.2023.10053412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

随着物联网(IoT)的起源,大量实时应用正在发展,但在这个网络世界中,保护这些设备或用户的数据将更加受到关注。智能服务是物联网应用的基础组成部分,如智能系统、智能家居、智能城市、智能汽车等。在资源受限的环境中,通过抵抗网络攻击和采用有效的加密方法来保护物联网生态系统中通过网络生成和传输的大量数据是一个迫在眉睫的挑战。本文重点介绍了对用户/设备身份进行的详尽工作,以及通过ECC(椭圆曲线加密)为物联网生态系统提供的轻量级加密可行解决方案。本研究使用ECC的各种安全策略,确保实时物联网应用中数据的安全传输和设备/用户的认证。对以前的工作进行了系统的调查,以确定为物联网生态系统设计基于ecc的认证和安全传输解决方案的关键方面。本研究的结果是ECC的基本组成部分,要求和ECC的解决方案架构,用于物联网生态系统的各个安全方面,以确保用户/设备隐私和安全的数据传输,并解决其挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey
With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
5689
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信