基于双椭圆曲线的资源受限智能设备轻量级认证与数据加密方案

IF 1.5 Q3 TELECOMMUNICATIONS
Vidya Rao, Prema K. V.
{"title":"基于双椭圆曲线的资源受限智能设备轻量级认证与数据加密方案","authors":"Vidya Rao,&nbsp;Prema K. V.","doi":"10.1049/wss2.12014","DOIUrl":null,"url":null,"abstract":"<p>The fast growth in Internet-of-Things (IoT) applications has increased the number of end-devices communicating over the Internet. As these resource-constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end-to-end security, research efforts have been carried out using elliptic curve cryptography-based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private keys, which are prone to be hacked under intense cryptanalysis. Thereby to increase the security strength the proposed method uses two sets of dynamic elliptic curves for performing digital signature and encryption processes. The method is evaluated on a client-server model using the Raspberry Pi-3 device. Herein, the choice of elliptic curves is made random at the client node and the reference of each elliptic curve is exchanged with the server during the key-exchange process. The choice of elliptic curves is delegated to the client machine to avoid the unwanted delay that would be encounter if server had to choose the curve. This is done because the client senses the data at regular intervals of time and forwards it to the server securely. Experiments were conducted to measure the time taken for hashing function, key generation, signature generation, signature verification, encryption and decryption process. On comparing the proposed DEC-LADE with cBLAKE2b, an improvement was seen at 13.76%, 2.57%, 18.36%, 6.12%, 9.91% and 6.08% less time, respectively, than LWDSA with mBLAKE2b. Theoretical and real-time security evaluations are performed for man-in-the-middle attack, replay attack, and a denial-of-service attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2021-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12014","citationCount":"5","resultStr":"{\"title\":\"DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices\",\"authors\":\"Vidya Rao,&nbsp;Prema K. V.\",\"doi\":\"10.1049/wss2.12014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The fast growth in Internet-of-Things (IoT) applications has increased the number of end-devices communicating over the Internet. As these resource-constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end-to-end security, research efforts have been carried out using elliptic curve cryptography-based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private keys, which are prone to be hacked under intense cryptanalysis. Thereby to increase the security strength the proposed method uses two sets of dynamic elliptic curves for performing digital signature and encryption processes. The method is evaluated on a client-server model using the Raspberry Pi-3 device. Herein, the choice of elliptic curves is made random at the client node and the reference of each elliptic curve is exchanged with the server during the key-exchange process. The choice of elliptic curves is delegated to the client machine to avoid the unwanted delay that would be encounter if server had to choose the curve. This is done because the client senses the data at regular intervals of time and forwards it to the server securely. Experiments were conducted to measure the time taken for hashing function, key generation, signature generation, signature verification, encryption and decryption process. On comparing the proposed DEC-LADE with cBLAKE2b, an improvement was seen at 13.76%, 2.57%, 18.36%, 6.12%, 9.91% and 6.08% less time, respectively, than LWDSA with mBLAKE2b. Theoretical and real-time security evaluations are performed for man-in-the-middle attack, replay attack, and a denial-of-service attack.</p>\",\"PeriodicalId\":51726,\"journal\":{\"name\":\"IET Wireless Sensor Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2021-02-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12014\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Wireless Sensor Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 5

摘要

物联网(IoT)应用的快速增长增加了通过互联网进行通信的终端设备的数量。由于这些资源受限的设备是通过Internet连接的,因此它们面临各种安全和隐私问题。传统上,为了提供端到端的安全性,研究人员使用基于椭圆曲线密码的身份验证方案进行了研究。现有的方案使用一组椭圆曲线参数来生成公钥和私钥,在激烈的密码分析下容易被黑客攻击。因此,为了提高安全强度,该方法使用两组动态椭圆曲线来执行数字签名和加密过程。该方法在使用Raspberry Pi-3设备的客户机-服务器模型上进行评估。其中,在客户端节点随机选择椭圆曲线,并在密钥交换过程中与服务器交换每条椭圆曲线的引用。椭圆曲线的选择委托给客户端机器,以避免服务器必须选择曲线时可能遇到的不必要的延迟。这样做是因为客户端每隔一段时间就会感知数据,并将其安全地转发给服务器。实验测量了哈希函数、密钥生成、签名生成、签名验证、加解密过程所花费的时间。将DEC-LADE与cBLAKE2b进行比较,改善时间分别比LWDSA与mBLAKE2b缩短13.76%、2.57%、18.36%、6.12%、9.91%和6.08%。对中间人攻击、重放攻击和拒绝服务攻击进行了理论和实时安全评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices

DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices

The fast growth in Internet-of-Things (IoT) applications has increased the number of end-devices communicating over the Internet. As these resource-constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end-to-end security, research efforts have been carried out using elliptic curve cryptography-based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private keys, which are prone to be hacked under intense cryptanalysis. Thereby to increase the security strength the proposed method uses two sets of dynamic elliptic curves for performing digital signature and encryption processes. The method is evaluated on a client-server model using the Raspberry Pi-3 device. Herein, the choice of elliptic curves is made random at the client node and the reference of each elliptic curve is exchanged with the server during the key-exchange process. The choice of elliptic curves is delegated to the client machine to avoid the unwanted delay that would be encounter if server had to choose the curve. This is done because the client senses the data at regular intervals of time and forwards it to the server securely. Experiments were conducted to measure the time taken for hashing function, key generation, signature generation, signature verification, encryption and decryption process. On comparing the proposed DEC-LADE with cBLAKE2b, an improvement was seen at 13.76%, 2.57%, 18.36%, 6.12%, 9.91% and 6.08% less time, respectively, than LWDSA with mBLAKE2b. Theoretical and real-time security evaluations are performed for man-in-the-middle attack, replay attack, and a denial-of-service attack.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Wireless Sensor Systems
IET Wireless Sensor Systems TELECOMMUNICATIONS-
CiteScore
4.90
自引率
5.30%
发文量
13
审稿时长
33 weeks
期刊介绍: IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信