Back to Search Start Over

Trivial Cryptographic Protocol for Resource-Constraint IoT Device Security Using OECC-KA

Authors :
K. Raja Rajeshwari
M. Ramakrishnan
Source :
Mobile Computing and Sustainable Informatics ISBN: 9789811618659
Publication Year :
2021
Publisher :
Springer Singapore, 2021.

Abstract

The IoT structures use data as a general rule; the data arrangement from contraptions can moreover be a goal of cyberattacks. It is a direct result of this that countermeasures dependent on encryption are as of now picking up in significance. Trivial (lightweight) cryptosystem is an encryption approach which includes slight impress with low-computational multifaceted nature. A few difficulties can block the fruitful execution of an IoT framework and its associated gadgets, including security, interoperability, power/handling capacities, adaptability, and accessibility. Many of these can be addressed with IoT gadget the board, for example, by accepting standard IoT conventions like lightweight M2M or utilising a comprehensive IoT gadget the executives stage offered by a reliable supplier as part of a SaaS model. In this paper, we propose a simple cryptography protocol for securing resource-constrained devices that uses Optimised ECC with Karatsuba algorithm (OECC-KA) for fast multiplication. Several efficient cryptographic algorithms have been widely used for resource constraint device; it may not be suitable with its limited computing power, bandwidth and CPU power. Elliptic curve cryptography is the best choice for limited power usage with high-level security. The traditional elliptic curve cryptography occupies 80% of execution time for scalar multiplication. The proposed optimized ECC with Karatsuba algorithm increases the execution time with fast multiplication algorithm.

Details

Database :
OpenAIRE
Journal :
Mobile Computing and Sustainable Informatics ISBN: 9789811618659
Accession number :
edsair.doi...........4eefab0741142a42175ecaae131bd57e