2019
DOI: 10.2478/cait-2019-0008
|View full text |Cite
|
Sign up to set email alerts
|

Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions

Abstract: Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 100 publications
0
4
0
Order By: Relevance
“…• Low Computational Capability-The smart cards have a low computational capacity of 1-5 MHz clock rate, less than 1 MB flash memory, and a few hundreds of KB RAM [5]. Owing to these restricted computational resources, it is challenging to develop computationally efficient security solutions that satisfy the required security attributes as well as security functions.…”
Section: Security Challenges Of Smart Cardsmentioning
confidence: 99%
“…• Low Computational Capability-The smart cards have a low computational capacity of 1-5 MHz clock rate, less than 1 MB flash memory, and a few hundreds of KB RAM [5]. Owing to these restricted computational resources, it is challenging to develop computationally efficient security solutions that satisfy the required security attributes as well as security functions.…”
Section: Security Challenges Of Smart Cardsmentioning
confidence: 99%
“…Various security protocols for WSNs based on different cryptographic systems with different level of security have been proposed by different authors. But the recent focus of the researchers has been on designing Elliptic Curve Cryptography (ECC) based security mechanisms for WSNs, since ECC based solutions are suitable for applications involving low computing power devices like wireless sensors [4]. Therefore in this section, the security protocols for WSNs based on elliptic curves proposed by different authors have been highlighted.…”
Section: Related Workmentioning
confidence: 99%
“…They proved that elliptic curve signcryption consumes 58% less time and 40% less communication bandwidth than the signature-then-encryption mechanism based on the elliptic curve. For low computing power devices (LCPDs) it is wise to use elliptic curve signcryption schemes, since it saves a huge amount of computational time and communication bandwidth, while also providing many security attributes including authentication, secure key establishment, confidentiality, nonrepudiation, integrity, unforgeability, and forward security [4]. The elliptic curve signcryption scheme proposed by Y. Zheng and H. Imai [21] has been publicized in Figure 3 to provide a glimpse that how elliptic curves can be used in designing signcryption schemes.…”
Section: Overview Of Signcryptionmentioning
confidence: 99%
See 1 more Smart Citation