2021
DOI: 10.1049/wss2.12014
|View full text |Cite
|
Sign up to set email alerts
|

DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices

Abstract: The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐devices communicating over the Internet. As these resource‐constrained devices are connected over the Internet, they are exposed to various security and privacy issues. Traditionally, to provide end‐to‐end security, research efforts have been carried out using elliptic curve cryptography‐based authentication schemes. These existing schemes use a single set of elliptic curve parameters to generate the public and private key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…5. The results expose that the TAMOMO-SCRP technique has accomplished higher NRE over the other methods [26], [27]. For instance, with 4000 rounds, the TAMOMO-SCRP technique has resulted in increased NRE of 127J, whereas the CIRP, MEEC, ZCA, OHCR, and IDHR models have obtained reduced NRE of 121J, 115J, 111J, 104J, and 101J respectively.…”
Section: Performance Validationmentioning
confidence: 91%
“…5. The results expose that the TAMOMO-SCRP technique has accomplished higher NRE over the other methods [26], [27]. For instance, with 4000 rounds, the TAMOMO-SCRP technique has resulted in increased NRE of 127J, whereas the CIRP, MEEC, ZCA, OHCR, and IDHR models have obtained reduced NRE of 121J, 115J, 111J, 104J, and 101J respectively.…”
Section: Performance Validationmentioning
confidence: 91%
“…Compared to cBLAKE2b, the proposed DECLADE required 13.76 percentage points, 2.57 percentage points, 18.36 percentage points, 6.12 percentage points, 9.91 percentage points, and 6.08 percentage points less time than mBLAKE2b with LWDSA. In addition, it did both theoretical and real-time safety assessments of man-in-the-middle, replay, and denial-of-service attacks [19].…”
Section: The Related Workmentioning
confidence: 99%
“…The prediction of user behavior sequence is to start from a given state, predict the subsequent states and the output values of the states in a limited step, and generate a more complete sequence of user behavior [29]. According to the finite stage optimal decision theory of Markov process, the prediction process is to find the starting point from the specified state in the transfer matrix step state transfer to obtain the maximum utility of the www.ijacsa.thesai.org transfer path.…”
Section: ) Prediction Of User Behavior Sequencementioning
confidence: 99%