Design of an Authorized Digital Signature Scheme for Sensor Network Communication in Secure Internet of Things

Author(s):  
Ling Feng ◽  
Bin Feng ◽  
Lei Zhang ◽  
XiQiang Duan
Author(s):  
V. Muthukumaran Et al.

Apparently enthusiasm for the Internet of things (IoT) has as of late arrived at its top, with a lot of center from both the private and public parts. IoT, an innovation that empowers the trading of information through linkage among all items encompassing the client, can make new administrations. Information correspondence among objects isn't restricted to individual data, yet can likewise convey diverse information types, for example, detecting data gathered from the general condition. At the point when such information is gathered and utilized malevolently by an assailant, it is more defenseless against dangers than in traditional organization situations. In this article we proposed for digital signature scheme for Internet of Things.


Author(s):  
Sumanth Koppula ◽  
Jayabhaskar Muthukuru

Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.


Author(s):  
Sumanth Koppula ◽  
Jayabhaskar Muthukuru

Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.


1997 ◽  
Vol 33 (22) ◽  
pp. 1861 ◽  
Author(s):  
Wei-Hua He ◽  
Tzong-Chen Wu

Sign in / Sign up

Export Citation Format

Share Document