Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/14964
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Achary, Rathnakar | - |
dc.contributor.author | Shelke, Chetan J | - |
dc.contributor.author | Marx, Kavin | - |
dc.contributor.author | Rajesh, Aishwarya | - |
dc.date.accessioned | 2024-03-30T10:11:00Z | - |
dc.date.available | 2024-03-30T10:11:00Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Vol. 230; pp. 493-502 | en_US |
dc.identifier.issn | 1877-0509 | - |
dc.identifier.uri | https://doi.org/10.1016/j.procs.2023.12.105 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/14964 | - |
dc.description.abstract | IoT devices typically encompass objects or devices equipped with software and internet connectivity, allowing them to collect data. They have limited processing power, memory, and storage. These limitations can make it difficult to secure these devices, as traditional security measures may not be practical. Implementing security for IoT devices can be challenging due to these characteristics, but several steps can be taken to mitigate these challenges. Elliptic Curve Cryptography (ECC) can secure resource constrained IoT devices by providing a more efficient method of encryption and authentication than traditional methods such as RSA. In this paper, we analyzed the lightweight cryptographic algorithm ECC for securing resource-constrained devices such as IoT and evaluated its performance compared to the RSA cryptosystem. The analysis result indicates that ECC is considered to provide stronger security than RSA for the same key length. The CoAP protocol is applied to devices with limited resources, and an examination of its impact is conducted, considering three key performance metrics: CPU usage, bandwidth efficiency, and message communication latency. © 2023 Elsevier B.V.. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Procedia Computer Science | en_US |
dc.publisher | Elsevier B.V. | en_US |
dc.subject | Coap | en_US |
dc.subject | Elliptical Curve Cryptography | en_US |
dc.subject | Iot | en_US |
dc.subject | Oscore | en_US |
dc.subject | Resource-Constrained Devices | en_US |
dc.subject | Rsa | en_US |
dc.title | Security Implementation on IoT Using Coap and Elliptical Curve Cryptography | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Size | Format | |
---|---|---|---|
1-s2.0-S1877050923021105-main.pdf Restricted Access | 1.06 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.