
International Journal of Engineering Research in Computer Science and Engineering
Volume4 ,September 2017.
Volume4,September 2017,
Topic : A Secured Public key Exchange Technique for Elliptic Curve Cryptography
Authors:A.Vithya Vijayalakshmi || A. Dalvin Vinoth Kumar, Er. Karthigai Priya Govindrajan, Dr. L. Arockiam
Abstract:Security is the most important factor in Internet of Things (IoT). The public key cryptography systems like RSA, DSA are not suitable for IoT Devices because of the key size and energy consumption. ECC cryptography system is more suitable for IoT lightweight devices. ECC provides same level of security as like RSA with small key size and less energy computation. Key exchange is challengeable task due to Routing transmission attacks like DoS attack. The proposed technique is to enhance key exchange system in ECC based security protocols. The public key is encrypted before shared into network. The path selection algorithm is used to choose two different paths. One is for encrypted public key sharing and another is for unlock-key for encrypted public key sharing. The possibility of attacks during key sharing is investigated; the key size and energy consumption is compared. This technique is suitable for Tmote Sky and MICAz nodes.
Keywords: ECC, IoT security, Encryption, Curve 25519, Public key, Tmote
Download Paper
DOI: 01.1617/vol4/iss9/pid63278
Related Articles
Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.
Authors: Avinash Singh || Ram Singar Verma
Doi : 01.1617/vol4/iss03/pid34591
Volume4 ,March 2017.
Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State
Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo
Doi : 01.1617/vol3/iss09/pid91783
Volume3 ,September 2017.
Decentralized Trust Management and Trust Worthiness of Cloud Environments
Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq
Doi : 01.1617/vol4/iss4/pid21386
Volume4 ,April 2017.
Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients
Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra
Doi : 01.1617/vol4/iss4/pid82074
Volume4 ,April 2017.
Multilevel Authentication System
Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares
Doi : 01.1617/vol4/iss4/pid82135
Volume4 ,April 2017.
Stock Prediction Using Clustering And Regression Techniques
Authors: Shalini Lotlikar || Megha Ainapurkar
Doi : 01.1617/vol4/iss4/pid39708
Volume4 ,April 2017.
Brain Tumor Detection using Image Segmentation
Authors: Siddhi N. Nerurkar ||
Doi : 01.1617/vol4/iss4/pid02845
Volume4 ,April 2017.
Video Mining using Query by Example
Authors: Rosebud Valadares ||
Doi : 01.1617/vol4/iss4/pid89542
Volume4 ,April 2017.
Fuzzy Opinion Mining for Product Recommender System
Authors: Aarti Bandodker ||
Doi : 01.1617/vol4/iss4/pid03652
Volume4 ,April 2017.
Aadhaar and Server based Electoral system
Authors: Yugansh Garg || Sakshi Mishra
Doi : 01.1617/vol4/iss4/pid69053
Volume4 ,April 2017.