Paper title: |
Node-Level Privacy Preservation Mechanism in Internet-of-Things Network using Elliptic Curve Cryptography |
DOI: | https://doi.org/10.4316/JACSM.202401004 |
Published in: | Issue 1, (Vol. 18) / 2024 |
Publishing date: | 2024-11-15 |
Pages: | 29-36 |
Author(s): | DAVIES Isobo Nelson, TAYLOR Onate, ANIREH Vincent Ike, BENETT Okoni |
Abstract. | In the realm of Internet-of-Things (IoT) networks, ensuring robust security at the node-level is paramount to safeguarding sensitive data and maintaining network integrity. This paper explores the utilization of Elliptic Curve Cryptography (ECC) as a potent cryptographic technique to reinforce node-level security and privacy preservation within IoT environments. By leveraging the inherent advantages of IBE and ECC, such as its ability to offer strong security with relatively smaller key sizes compared to traditional cryptographic methods, this paper investigates the performance and security and privacy implications of the ECC in securing data transmission at the edge of IoT network and devices. Through a comprehensive analysis, this paper evaluates the practical feasibility of the ECC in mitigating various security risks, including unauthorized access, data breaches, and malicious attacks, within IoT networks. Our experimental results demonstrate the efficiency and effectiveness of the ECC in providing cryptographic protection by achieving an average throughput of 5Mbps, ensuring real-time data transmission in network, and its encryption and decryption exhibited low latency, with an average response time of 0.7 and 0.6 milliseconds respectively, which enables timely preprocessing of encrypted and decrypted data at the edge devices. Additionally, our findings presented herein underscore the significance of ECC as a promising avenue for bolstering security and privacy at the node for IoT-enabled devices, offering valuable insights for researchers, practitioners, and stakeholders invested in enhancing the security posture of IoT ecosystems. |
Keywords: | Elliptic Curve Cryptography (ECC), Identity-Based Encryption (IBE), Internet-of-Things (IoT) |
References: | 1. Challa, N., & Jayaram, P. (2008). Evaluation of Performance Characteristics of Cryptosystem using Text Files. Journal of Theoretical and Applied Information Technology, 55-59. 2. Cook, J., Rehman, S. U., & Khan, M. A. (2023). Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions. IEEE Access, 11, 39295-39317. 3. Hammi, B., Fayad, A., Khatoun, R., Zeadally, S., & Begriche, Y. (2020). A Lightweight ECC-based Authentication Scheme for Internet of Things (IoT). IEEE Systems Journal, 14(3), 3440-3450. 4. Hankerson, D., Menezes, A., & Scott, V. (2021). Elliptic Curve Cryptography Encyclopedia of Cryptography, Security and Privacy (pp. 1-2). New York: Springer. 5. Hegde, N. P., & Deepthi, P. (2022). Elliptic Curve Cryptography using Authenticated Encryption. International Journal of Engineering Research and Applications, 12(4), 35-40. doi:10.9790/9622-1204043540 6. Kanza, A. S., Takreem, H., Umar, H., & Miguel, D. B. (2023). An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform. Appl. Sci, 13(8385), 2-19. 7. Khan, M. R., Upreti, K., Alam, M. I., Khan, H., Siddiqui, S. T., Haque, M., & Parashar, J. (2023). Analysis of Elliptic Curve Cryptography & RSA. Journal of ICT Standardization, 11(4), 355-378. 8. Nita, S. L., & Mihailescu, M. I. (2023). Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain. Sensors, 23(3), 1371. 9. Nyangaresi, V. O. (2021). ECC based Authentication Scheme for Smart Homes. Paper presented at the 63rd International Symposium ELMAR, Zadar, Croatia, 5-10. 10. Ogundoyin, I. K., Ogunbiyi, D. T., Adebanji, S., & Okeyode, Y. O. (2022). Comparative Analysis and Performance Evaluation of Cryptographic Algorithms. UNIOSUN Journal of Engineering and Environmental Sciences, 4(1), 39-47. 11. Pan, W., Zheng, F., Zhao, Y., Zhu, W.-T., & Jing, J. (2016). An Efficient Elliptic Curve Cryptography Signature Server with GPU Acceleration. IEEE Transactions on Information Forensics and Security, 12(1), 111-122. 12. Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security Protocol using Elliptic Curve Cryptography Algorithm for Wireless Sensor Networks. Journal of Ambient Intelligence and Humanized Computing, 12, 547-566. 13. Satapathy, U., Mohanta, B. K., Jena, D., & Sobhanayak, S. (2018). An ECC based Lightweight Authentication Protocol for Mobile Phone in Smart Home. Paper presented at the 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS), Odisha, India, 303-308. 14. Sullivan, N. (2013). A (Relatively Easy to Understand) Primer on Elliptic Curve Cryptography. URL: https://blog. cloudflare. com/a-relatively-easy-to-understandprimer-on-elliptic-curve-cryptography/(visited on 29th May 2015). 15. Torre, D., Chennamaneni, A., & Rodriguez, A. (2023). Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study. IEEE Access, 11, 16323-16345. 16. Vagle, J. L. (2000). A Gentle Introduction to Elliptic Curve Cryptography. Cambridge (MA): BBN Technologies, 1-24. 17. Velliangiri, S., Manoharn, R., Ramachandran, S., Venkatesan, K., Rajasekar, V., Karthikeyan, P., . . . Dhanabalan, S. S. (2021). An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based on Elliptic Curve Cryptography. IEEE Transactions on Industrial Informatics, 18(9), 6494-6502.
|
Back to the journal content |