Skip to main content
Top
Published in: Cluster Computing 5/2019

03-01-2018

Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments

Authors: K. Sathish Kumar, R. Sukumar

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet based services in IoT environments. As IoT environment connected to heterogeneous network, they become vulnerable to attacks and hence it is required for secured mechanism for data transfer. Moreover, when secured cryptographic algorithms are employed in mobile phones, battery consumption plays a major role. The IoT environment associated with proposed algorithm can be used to interlink humans and enable the use of a communication channel to bring forth inter machine interaction. The encryption procedures used here makes sure that the major concerns of authentication uniqueness, confidentiality and privacy of the users are maintained. This implies that the users and the service providers can implement the system security measures that have been proposed. Research is still being conducted to improve the architecture and implementation strategies in a real time environment. In order to solve those issues, this paper proposes a novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time. The performance evaluation with the key size of 14 and 16 bits reveals that the proposed algorithm can be fast and saves the battery life than the other conventional ECC algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)CrossRef Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46–54 (2017)CrossRef
2.
go back to reference Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017) Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419. ISSN: 0974-2115 (2017)
3.
go back to reference Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016) Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016)
4.
go back to reference Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016) Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19–21 (2016)
5.
go back to reference Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016) Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498–502 (2016)
7.
go back to reference Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://www.irjet.net/. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016) Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). http://​www.​irjet.​net/​. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016)
8.
go back to reference Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016) Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016)
9.
go back to reference Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016) Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016)
10.
go back to reference Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://www.jatit.org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016) Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). http://​www.​jatit.​org. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016)
11.
go back to reference Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015) Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604–3608 (2015)
12.
go back to reference Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014) Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63–70 (2014)
13.
go back to reference Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014) Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014)
14.
go back to reference Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014) Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296–7301 (2014)
15.
go back to reference Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014) Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322–328 (2014)
17.
go back to reference Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013) Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013)
18.
go back to reference Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012) Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581–1590. ISSN: 0975-0290 (2012)
20.
go back to reference Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011) Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011)
21.
go back to reference Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010) Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010)
22.
go back to reference Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010) Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)
Metadata
Title
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments
Authors
K. Sathish Kumar
R. Sukumar
Publication date
03-01-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1542-8

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner