Abstract
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Highlights
The rapid evolution of Internet of Things (IoT) will lead in the coming years to important changes in everyday life for people
Every data collected by an IoT device can be useful for criminals for obtaining information about people being at home, or work
Execution of a test program in the IoT platform is presented in Figure 18, showing an example of Elliptic Curve Cryptography (ECC) scalar-point operation and other example of Advanced Encryption Standard (AES) encryption
Summary
The rapid evolution of Internet of Things (IoT) will lead in the coming years to important changes in everyday life for people. New IoT applications are appearing daily, taking advantage of connectivity of smart devices, providing new features and services for industry, finance, or the final user. The enthusiasm about these new features is making engineers and companies not fully address the threats and risks to security and privacy that this wide connectivity of things poses. Every data collected by an IoT device (temperature, humidity, power consumption, etc.) can be useful for criminals for obtaining information about people being at home, or work. In a globally interconnected world where cybercrime growths every year, security in IoT will be a critical challenge for its success and effective deployment [1,2,3,4,5]. In [1], security and privacy requirements for
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have