Skip to main content
Erschienen in: Cluster Computing 5/2019

03.01.2018

Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments

verfasst von: K. Sathish Kumar, R. Sukumar

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet based services in IoT environments. As IoT environment connected to heterogeneous network, they become vulnerable to attacks and hence it is required for secured mechanism for data transfer. Moreover, when secured cryptographic algorithms are employed in mobile phones, battery consumption plays a major role. The IoT environment associated with proposed algorithm can be used to interlink humans and enable the use of a communication channel to bring forth inter machine interaction. The encryption procedures used here makes sure that the major concerns of authentication uniqueness, confidentiality and privacy of the users are maintained. This implies that the users and the service providers can implement the system security measures that have been proposed. Research is still being conducted to improve the architecture and implementation strategies in a real time environment. In order to solve those issues, this paper proposes a novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time. The performance evaluation with the key size of 14 and 16 bits reveals that the proposed algorithm can be fast and saves the battery life than the other conventional ECC algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)CrossRef Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)CrossRef
2.
Zurück zum Zitat Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017) Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017)
3.
Zurück zum Zitat Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016) Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016)
4.
Zurück zum Zitat Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016) Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016)
5.
Zurück zum Zitat Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016) Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016)
7.
Zurück zum Zitat Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://www.irjet.net/. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016) Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://​www.​irjet.​net/​. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016)
8.
Zurück zum Zitat Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016) Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016)
9.
Zurück zum Zitat Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016) Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016)
10.
Zurück zum Zitat Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://www.jatit.org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016) Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://​www.​jatit.​org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016)
11.
Zurück zum Zitat Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015) Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015)
12.
Zurück zum Zitat Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014) Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014)
13.
Zurück zum Zitat Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014) Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014)
14.
Zurück zum Zitat Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014) Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014)
15.
Zurück zum Zitat Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014) Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014)
17.
Zurück zum Zitat Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013) Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013)
18.
Zurück zum Zitat Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012) Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012)
20.
Zurück zum Zitat Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011) Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011)
21.
Zurück zum Zitat Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010) Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010)
22.
Zurück zum Zitat Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010) Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)
Metadaten
Titel
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments
verfasst von
K. Sathish Kumar
R. Sukumar
Publikationsdatum
03.01.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1542-8

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe