Javascript must be enabled to continue!
Key Management Scheme for Internet of Things Using an Elliptic Curve
View through CrossRef
With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario in which objects we use everyday
are accessible using the internet and can be controlled from anywhere (Kung, Y.F., et al., 2018. Home Monitoring System Based Internet of Things. 2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE. pp.325–327; Singh, S. and Singh, N., 2015. Internet
of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). It could comprise devices with sensors to gather and broadcast
data over the Internet (Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581).
As per report of the research firm Gartner, the number of IoT objects will surpass 11.2 billion by 2018, and 20.4 billion by 2020. By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars. As IoT devices are largely used in various areas of importance, it will definitely
bring a lot of interests to hackers. It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018. They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28
countries. Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology. This paper proposes a new key management scheme with entity authentication for IoT devices. The proposed scheme uses modified Tate pairing. The presented
scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.
American Scientific Publishers
Title: Key Management Scheme for Internet of Things Using an Elliptic Curve
Description:
With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries.
The IoT is a computing notion that describes a scenario in which objects we use everyday
are accessible using the internet and can be controlled from anywhere (Kung, Y.
F.
, et al.
, 2018.
Home Monitoring System Based Internet of Things.
2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE.
pp.
325–327; Singh, S.
and Singh, N.
, 2015.
Internet
of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce.
2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE.
pp.
1577–1581).
It could comprise devices with sensors to gather and broadcast
data over the Internet (Singh, S.
and Singh, N.
, 2015.
Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce.
2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE.
pp.
1577–1581).
As per report of the research firm Gartner, the number of IoT objects will surpass 11.
2 billion by 2018, and 20.
4 billion by 2020.
By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars.
As IoT devices are largely used in various areas of importance, it will definitely
bring a lot of interests to hackers.
It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018.
They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28
countries.
Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology.
This paper proposes a new key management scheme with entity authentication for IoT devices.
The proposed scheme uses modified Tate pairing.
The presented
scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks result...
Choosing a Suitable Public Cryptosystem for Internet of Things
Choosing a Suitable Public Cryptosystem for Internet of Things
The Internet of Things (IoT) has ushered in numerous devices in many areas in our life and in industries. It could comprise devices with sensors to gather and broadcast data over t...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
Curve Shape Modification and Fairness Evaluation
Curve Shape Modification and Fairness Evaluation
A method to generate a quintic NURBS curve which passes through the given points is described. In this case, there are four more equations than there are positions of the control p...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...
Efficient Mapping Scheme for Elliptic Curve Cryptosystem in a Multiprocessing Environment
Efficient Mapping Scheme for Elliptic Curve Cryptosystem in a Multiprocessing Environment
Abstract
The security of Elliptic Curve Cryptosystem (ECC) hinges on on the hardness of Elliptic Curve Discrete Logic Problem. However, existing mapping schemes are ineffic...

