A Performance Evaluation of Data Protection Mechanisms for Resource Constrained IoT Devices

Author(s):  
Clemens Lachner ◽  
Schahram Dustdar
2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


Waterlines ◽  
1993 ◽  
Vol 12 (2) ◽  
pp. 29-31 ◽  
Author(s):  
Vinay Pratap Singh ◽  
Malay Chaudhuri

2013 ◽  
Vol E96.B (6) ◽  
pp. 1435-1443 ◽  
Author(s):  
Shuang QIN ◽  
Gang FENG ◽  
Wenyi QIN ◽  
Yu GE ◽  
Jaya Shankar PATHMASUNTHARAM

Author(s):  
Ahmed Abdelsalam ◽  
Pier Luigi Ventre ◽  
Carmine Scarpitta ◽  
Andrea Mayer ◽  
Stefano Salsano ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document