期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
IECC-SAIN:Innovative ECC-Based Approach for Secure Authentication in IoT Networks
1
作者 Younes Lahraoui Jihane Jebrane +2 位作者 Youssef Amal Saiida Lazaar Cheng-Chi Lee 《Computer Modeling in Engineering & Sciences》 2025年第7期615-641,共27页
Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with... Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with shorter key lengths,which significantly reduces the computational overhead required for authentication algorithms.This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields.By reducing reliance on costly point multiplication,the proposed algorithm significantly improves execution time,storage requirements,and communication cost across varying security levels.The proposed authentication protocol demonstrates superior performance when benchmarked against relevant ECC-based schemes,achieving reductions of up to 35.83%in communication overhead,62.51%in device-side storage consumption,and 71.96%in computational cost.The security robustness of the scheme is substantiated through formal analysis using the Automated Validation of Internet Security Protocols and Applications(AVISPA)tool and Burrows-Abadir-Needham(BAN)logic,complemented by a comprehensive informal analysis that confirms its resilience against various attack models,including impersonation,replay,and man-in-the-middle attacks.Empirical evaluation under simulated conditions demonstrates notable gains in efficiency and security.While these results indicate the protocol’s strong potential for scalable IoT deployments,further validation on real-world embedded platforms is required to confirm its applicability and robustness at scale. 展开更多
关键词 Industrial IoT Elliptic Curve Cryptography(ECC) National Institute of Standards and Technology(NIST)curves mapping AVISPA BAN logic computational efficiency security scalable IoT deployments
在线阅读 下载PDF
Special issue on future network:software-defined networking 被引量:1
2
作者 Tao HUANG F.Richard YU Yun-jie LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第7期603-605,共3页
Computer networks have to support an everincreasing array of applications,ranging from cloud computing in datacenters to Internet access for users.In order to meet the various demands,a large number of network devices... Computer networks have to support an everincreasing array of applications,ranging from cloud computing in datacenters to Internet access for users.In order to meet the various demands,a large number of network devices running different protocols are designed and deployed in networks. 展开更多
关键词 networking deployment cloud running users partition challenging centralized embedding scalability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部