An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve

Author(s):  
Sanaa EL AIDI ◽  
Abderrahim Bajit ◽  
Anass BARODI ◽  
Habiba CHAOUI ◽  
Ahmed Tamtaoui

Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2018 ◽  
Vol 10 (3) ◽  
pp. 42-60 ◽  
Author(s):  
Sahar A. El-Rahman ◽  
Daniyah Aldawsari ◽  
Mona Aldosari ◽  
Omaimah Alrashed ◽  
Ghadeer Alsubaie

IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain with the growth of IoT and the speed of the life. Different algorithms were utilized to accomplish the integrity of the documents, authenticate users with their unique signatures, and encrypt their documents in order to provide the best adopted solution for cloud-based signature in the field of IoT. Where, ECDSA (Elliptic Curve Digital Signature Algorithm) is utilized to ensure the message source, Hash function (SHA-512) is used to detect all information variations, and AES (Advanced Encryption Standard) is utilized for more security. SignOn is considered as a legal obligated way of signing contracts and documents, keeping the data in electronic form in a secure cloud environment and shortens the duration of the signing process. Whereas, it allows the user to sign electronic documents and then, the verifier can validate the produced signature.


Author(s):  
Mao Chen ◽  
Yong Lin

<span lang="EN-US">T</span><span lang="EN-US">o effectively improve the operation</span><span lang="EN-US">,</span><span lang="EN-US"> management, and service level of the intelligent park, a preliminary study and discussion is conducted on the design and implementation of the Internet of Things (IoT) information system in the intelligent park. Firstly, the hardware architecture and technical scheme of the information system of intelligent park based on Internet of things and cloud computing are proposed, and the information system architecture of the intelligent park is introduced. The construction of the system architecture is based on the three-tier architecture of perception, network and application</span><span lang="EN-US">; secondly, based on this system architecture, the functions of each component of the information system are explained from the perception layer, network layer and application layer, and some typical sensors in the system are introduced; finally, the system is analyzed experimentally.</span><span lang="EN-US">The results show that the system can realize the interconnection among various communication terminals and improve the efficiency of cooperation among various systems.</span><span lang="EN-US">It can be concluded that the information system of the intelligent park based on cloud computing and Internet of things can achieve the desired effect.</span>


2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


Sign in / Sign up

Export Citation Format

Share Document