Abstract

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.

Highlights

  • elliptic curve cryptography (ECC) plays a valuable role in securing communications in constrained and resource-limited environments, including the Internet of Things (IoT) and wireless sensor networks (WSNs) [7]

  • To prevent tampering, to maintain the integrity of the cipher text, to ensure that the transmitted message is secured against encryption attacks, and to enhance the mapping phase performance, the proposed scheme ensures the authenticated encryption (AE) property, resists Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA), and enhances the mapping phase performance

  • This study proposes a novel approach to elliptic curve cryptography (ECC) that offers AE

Read more

Summary

Introduction

The continuous growth of industrialization and urbanization in recent years has led to the estimate that by 2025 there will be 21.5 billion actively connected Internet of Things (IoT) devices worldwide [1]. The constrained properties of IoT devices, which include low performance in terms of computational resources and storage space, led to the adoption of edge computing [3]. For these reasons, the need to maintain data confidentiality and integrity has increased, which has caused an explosion of interest in cryptography schemes [4]. There are two types of encryption scheme, which are based on the nature of the key that will be used to encrypt and decrypt the data: which known as, symmetric cryptography and asymmetric cryptography [5]. ECC plays a valuable role in securing communications in constrained and resource-limited environments, including the IoT and wireless sensor networks (WSNs) [7]

Encryption Attacks on Asymmetric Cryptography
Elliptic Curve Cryptography
Related Works
The Proposed Scheme
Generating System Parameters
H ASH k sh gk sh
Edge and current nodes update their nList
Encrypting and Decrypting the Mapped Points
Decoding and Converting the Decrypted Points into Plain Text
Signing and Verifying the Encrypted Message
Security Analysis and Performance Evaluation
Indistinguishability under Chosen Plain Text Attack IND-CPA
Indistinguishability Under Chosen Ciphertext Attack IND-CCA
Malleability Attack
Performance Evaluation
Mapping Points to an Elliptic Curve
Simulation Performance Evaluation
Findings
Conclusions and Future Research
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call