2017 International Conference on IoT and Application (ICIOT) 2017
DOI: 10.1109/iciota.2017.8073643
|View full text |Cite
|
Sign up to set email alerts
|

Using symmetric and asymmetric cryptography to secure communication between devices in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(24 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…have created several cloud based products that help users monitor various sensors and vehicles used on a farm. These PaaS systems generally run on popular cloud computing platforms like Amazon Web Services, 14 Google Cloud, 15 etc. The way these farming PaaS systems are built using these popular cloud computing platforms also introduce various security challenges in smart farming ecosystem.…”
Section: Cloud Layermentioning
confidence: 99%
See 1 more Smart Citation
“…have created several cloud based products that help users monitor various sensors and vehicles used on a farm. These PaaS systems generally run on popular cloud computing platforms like Amazon Web Services, 14 Google Cloud, 15 etc. The way these farming PaaS systems are built using these popular cloud computing platforms also introduce various security challenges in smart farming ecosystem.…”
Section: Cloud Layermentioning
confidence: 99%
“…While cryptography-based solutions prove their effectiveness in securing both intra-layer and inter-layer communications, employing them on constrained IoT devices is a big concern. There are, however, limited attempts to apply lightweight cryptography solutions to a smart farming ecosystem [14]. Additionally, quantum-based cryptography for a secure end to end communication for IoT devices is under active investigation [63] as a futuristic solution.…”
Section: Authentication and Secure Communicationmentioning
confidence: 99%
“…The most common strategy adopted when facing the security issue in IoT systems, is the use of symmetric and asymmetric schemes in a mixed fashion, where the authentication processes of the nodes relies on the asymmetric part, and the message exchange is done with symmetric algorithms. These are known to be more efficient if the communication channel is trustable [25]. For asymmetric authentication, usually Elliptic-Curve Cryptography (ECC) is the preferred choice, since the same security level can be achieved with smaller key sizes compared to other alternatives, such as RSA [26].…”
Section: Cookie Node With Enhanced Hardware Securitymentioning
confidence: 99%
“…An ECC-based signcryption method was introduced in "Henriques and Vernekar [5]", the public values were bound with the public keys so this is also a certificate based approach and it relies on the binding of certificates from a server which is known as the trusted server. In this approach the computational overhead of using certificates is solved but the use of public key encryption is stagnant challenge.…”
Section: ) Pre-shared Mode Pskmentioning
confidence: 99%