Next Article in Journal
Mimicking the Martian Hydrological Cycle: A Set-Up to Introduce Liquid Water in Vacuum
Previous Article in Journal
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
Previous Article in Special Issue
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264
Article

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

by and *,†
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(21), 6158; https://doi.org/10.3390/s20216158
Received: 20 August 2020 / Revised: 15 October 2020 / Accepted: 26 October 2020 / Published: 29 October 2020
(This article belongs to the Special Issue Monitoring of Security Properties in IoT and Emerging Technologies)
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge. View Full-Text
Keywords: authenticated encryption; asymmetric cryptography; chosen cipher text attack; chosen plain text attack; edge computing; elliptic curve cryptography; encryption; internet of things; industrial internet of things authenticated encryption; asymmetric cryptography; chosen cipher text attack; chosen plain text attack; edge computing; elliptic curve cryptography; encryption; internet of things; industrial internet of things
Show Figures

Figure 1

MDPI and ACS Style

AlMajed, H.; AlMogren, A. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things. Sensors 2020, 20, 6158. https://doi.org/10.3390/s20216158

AMA Style

AlMajed H, AlMogren A. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things. Sensors. 2020; 20(21):6158. https://doi.org/10.3390/s20216158

Chicago/Turabian Style

AlMajed, Hisham, and Ahmad AlMogren. 2020. "A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things" Sensors 20, no. 21: 6158. https://doi.org/10.3390/s20216158

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop