A lightweight secure CoAP for IoT-cloud paradigm using Elliptic-curve cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. ...

متن کامل

Lightweight DTLS Implementation in CoAP-based IoT

Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper addresses this need by providing a frame...

متن کامل

Elliptic curve cryptography in cloud computing security

Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...

متن کامل

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

Elliptic Curve Cryptography (ECC) is emerging as an attractive alternative to traditional public-key cryptosystems (RSA, DSA, DH). ECC offers equivalent security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth savings. While these characteristics make ECC especially appealing for mobile devices, they can also alleviate the comput...

متن کامل

A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography

The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2020

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v20.i3.pp1460-1470