Abstract

Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity protocols on IoT devices, platform packages, and Internet tools. A significant problem is developing a simple security mechanism suitable for resource-constrained IoT devices. Elliptic curve cryptography (ECC) is extensively utilized and well-suited for use in low-resource environments like smartphone devices. ECC utilizes short crypto keys with the same security strength as conventional cryptosystems, decreasing power consumption and enhancing device efficiency. This study comprehensively evaluates ECC data privacy and security techniques in IoT-based devices. The research also looked into other cryptography protocols that ECC may use to increase security and performance. The inclusion procedures were papers published between 2018 and 2023, written in English, and published in a peer-reviewed scholarly outlet. This research eventually reviewed 61 suitable publications in total. Compared to other cryptographic methods, the study discovered that ECC has received greater attention or is frequently employed in IoT-based systems. However, additional issues and concerns must be addressed, including efficient IoT device security, maintaining privacy, and device security against vulnerability assaults such as man-in-the-middle attacks. For the efficient security of the IoT-based system, an improved ECC-based algorithm should be developed to enhance the security and privacy issues of the IoT system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call