1. Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
- Author
-
Abderrazak Abdaoui, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, and Mohsen Guizani
- Subjects
Internet of things ,Computer Networks and Communications ,Testing ,Smart System ,Geometry ,Pseudo random number ,Fuzzy-Logic ,Random number generation ,Pollard’ ,Security and privacy ,Number theory ,Frequency tests ,Authentication ,Shift registers ,Network security ,Computer circuits ,Discrete Fourier transforms ,Computer Science Applications ,Fuzzy logic ,Hardware and Architecture ,Signal Processing ,S ρ ,Security ,Public key cryptography ,Pseudo-random numbers ,Information Systems - Abstract
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoT systems. In this paper, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests such as: frequency test, frequency test with mono block, run test, discrete Fourier transform test and advanced discrete Fourier transform test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms such as Pollard’s ρ and Baby-step Giant-step to evaluate the vulnerability of the proposed scheme. IEEE Scopus
- Published
- 2022
- Full Text
- View/download PDF