2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) 2016
DOI: 10.1109/percomw.2016.7457161
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 21 publications
0
33
0
Order By: Relevance
“…On the other hand, most of the compact digital signatures (e.g., elliptic curve (EC) based signatures) require costly operations such as EC scalar multiplication and addition during signature generation. It has been shown [5], [6], [7], and further demonstrated by our experiments that, these operations can be energy costly, and therefore, can negatively impact the battery life of highly resource-limited embedded devices. For instance, as one of the many potential applications, we can refer to a resource-limited sensor (e.g., a medical device [1]) that frequently generates and signs sensitive data (medical readings), which are verified by a resourceful cloud service provider.…”
Section: Introductionmentioning
confidence: 71%
“…On the other hand, most of the compact digital signatures (e.g., elliptic curve (EC) based signatures) require costly operations such as EC scalar multiplication and addition during signature generation. It has been shown [5], [6], [7], and further demonstrated by our experiments that, these operations can be energy costly, and therefore, can negatively impact the battery life of highly resource-limited embedded devices. For instance, as one of the many potential applications, we can refer to a resource-limited sensor (e.g., a medical device [1]) that frequently generates and signs sensitive data (medical readings), which are verified by a resourceful cloud service provider.…”
Section: Introductionmentioning
confidence: 71%
“…Following the fact that the computation performance of this equipment is steadily improving [89] (see Table 3 comparing the hardware parameters of selected devices), the contemporary embedded devices are becoming capable of performing heavy computation tasks similar to the laptop computers. See Figure 10 for details, where selected embedded devices are demonstrated.…”
Section: Resultsmentioning
confidence: 99%
“…If a sensor (e.g., a fingerprint reader) is being utilized and that device is not available from where the user is attempting to log in or gain access-the user experience becomes inadequate. Having a dual-purpose device-smartphone or smartwatch (suitable for executing the information security primitives [205]), which the user already has in his or her possession-as an additional MFA factor (not only as a token) makes both the system costs and usability much more reasonable [206].…”
Section: Enabling Flexible Mfa Operationmentioning
confidence: 99%