• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于边缘计算和物联网的基于椭圆曲线密码体制的安全高效方案。

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.

作者信息

AlMajed Hisham, AlMogren Ahmad

机构信息

Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia.

出版信息

Sensors (Basel). 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158.

DOI:10.3390/s20216158
PMID:33138018
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7662995/
Abstract

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study's objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one's security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.

摘要

物联网(IoT)的近期发展引发了对物联网设备与边缘之间交换数据保密性的安全担忧。许多物联网系统采用非对称密码学来保护其数据和通信。非对称密码学的一个缺点是计算量和空间需求较大。然而,椭圆曲线密码学(ECC)由于在生成具有小密钥大小的强大加密机制方面具有优势,因而在受限环境中被广泛用于非对称密码学。ECC提高了设备性能并降低了功耗,这意味着它适用于从物联网到无线传感器网络(WSN)设备的各种应用。为确保数据和通信的保密性和安全性,有必要稳健地实施ECC。在这方面,一个特别关注的领域是映射阶段。本研究的目标是提出一种经过测试和可信的方案,该方案通过增强明文到椭圆曲线的映射阶段来提供认证加密(AE),以抵御诸如选择明文攻击(CPA)和选择密文攻击(CCA)等多种加密攻击。所提出的方案还对特定加密属性的安全要求进行评估和分析。最后,给出了所提出方案与其他方案的比较结果,评估了每个方案的安全特性和性能指标。我们的方案具有高效性,非常适合物联网,特别是对服务需求巨大 的工业物联网和新型城镇化。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/2c05f5519601/sensors-20-06158-g036.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/460ce7b88675/sensors-20-06158-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/e7e11440c319/sensors-20-06158-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/178e68abfd2a/sensors-20-06158-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/0a610d426852/sensors-20-06158-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/930df0c076cf/sensors-20-06158-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/1bfa4221b39f/sensors-20-06158-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/cf99da7867e1/sensors-20-06158-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/bd8340e003b2/sensors-20-06158-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/82bb5ac25d08/sensors-20-06158-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/3301ea6a1e7a/sensors-20-06158-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/24dc8537e160/sensors-20-06158-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/79fa5e704181/sensors-20-06158-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/67d2254ae557/sensors-20-06158-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/f50a24a2f711/sensors-20-06158-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/e4a7677f8bd1/sensors-20-06158-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/987db3eea9a4/sensors-20-06158-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/3421faf0ffb0/sensors-20-06158-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/9adcb4ee38fe/sensors-20-06158-g033.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/dbfa45d1f9e4/sensors-20-06158-g034.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/af753cbc71d6/sensors-20-06158-g035.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/2c05f5519601/sensors-20-06158-g036.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/460ce7b88675/sensors-20-06158-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/e7e11440c319/sensors-20-06158-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/178e68abfd2a/sensors-20-06158-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/0a610d426852/sensors-20-06158-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/930df0c076cf/sensors-20-06158-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/1bfa4221b39f/sensors-20-06158-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/cf99da7867e1/sensors-20-06158-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/bd8340e003b2/sensors-20-06158-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/82bb5ac25d08/sensors-20-06158-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/3301ea6a1e7a/sensors-20-06158-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/24dc8537e160/sensors-20-06158-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/79fa5e704181/sensors-20-06158-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/67d2254ae557/sensors-20-06158-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/f50a24a2f711/sensors-20-06158-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/e4a7677f8bd1/sensors-20-06158-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/987db3eea9a4/sensors-20-06158-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/3421faf0ffb0/sensors-20-06158-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/9adcb4ee38fe/sensors-20-06158-g033.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/dbfa45d1f9e4/sensors-20-06158-g034.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/af753cbc71d6/sensors-20-06158-g035.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/904d/7662995/2c05f5519601/sensors-20-06158-g036.jpg

相似文献

1
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.一种用于边缘计算和物联网的基于椭圆曲线密码体制的安全高效方案。
Sensors (Basel). 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158.
2
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.基于物联网的医疗保健系统中具有可证明安全性的高效用户认证和用户匿名方案。
Sensors (Basel). 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482.
3
Compressive sensing based secure data aggregation scheme for IoT based WSN applications.基于压缩感知的物联网无线传感器网络应用中安全数据聚合方案。
PLoS One. 2021 Dec 16;16(12):e0260634. doi: 10.1371/journal.pone.0260634. eCollection 2021.
4
iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography.iTrust - 椭圆曲线密码学中一种可信且高效的映射方案
Sensors (Basel). 2020 Nov 30;20(23):6841. doi: 10.3390/s20236841.
5
Integrating meta-heuristic with named data networking for secure edge computing in IoT enabled healthcare monitoring system.将元启发式与命名数据网络集成到物联网支持的医疗保健监测系统中的安全边缘计算中。
Sci Rep. 2024 Sep 15;14(1):21532. doi: 10.1038/s41598-024-71506-z.
6
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.用于物联网雾计算应用的高安全性节能网关的实际评估
Sensors (Basel). 2017 Aug 29;17(9):1978. doi: 10.3390/s17091978.
7
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.一种高效且可证明安全的基于证书的物联网 (IoT) 中移动健康 (M-Health) 系统的组合签名、加密和签密方案。
J Med Syst. 2020 Nov 27;45(1):4. doi: 10.1007/s10916-020-01658-8.
8
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.增强ZigBee无线传感器网络的安全性:一种用于设备到设备通信的新方法和相互认证方案。
Sensors (Basel). 2023 Jun 19;23(12):5703. doi: 10.3390/s23125703.
9
A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.基于 RSA 和 ECC 的密码套件在物联网高安全性节能雾和霾计算设备中的实用评估。
Sensors (Basel). 2018 Nov 10;18(11):3868. doi: 10.3390/s18113868.
10
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.具有组密钥支持的统一紧凑型ECC-AES协处理器,用于无线传感器网络中的物联网设备。
Sensors (Basel). 2018 Jan 16;18(1):251. doi: 10.3390/s18010251.

引用本文的文献

1
A generalized framework for elliptic curves based PRNG and its utilization in image encryption.基于椭圆曲线的伪随机数生成器的通用框架及其在图像加密中的应用。
Sci Rep. 2022 Aug 2;12(1):13278. doi: 10.1038/s41598-022-17045-x.
2
Research on Humanistic Quality Higher Medical Education Based on Internet of Things and Intelligent Computing.基于物联网和智能计算的人文素质高等医学教育研究。
Comput Intell Neurosci. 2022 Mar 24;2022:8633190. doi: 10.1155/2022/8633190. eCollection 2022.
3
Application of Edge Computing Technology in Hydrological Spatial Analysis and Ecological Planning.

本文引用的文献

1
A New Quantum Blind Signature Scheme with BB84-State.一种基于BB84态的新型量子盲签名方案。
Entropy (Basel). 2019 Mar 28;21(4):336. doi: 10.3390/e21040336.
2
Use of Thermistor Temperature Sensors for Cyber-Physical System Security.热敏电阻温度传感器在网络物理系统安全中的应用。
Sensors (Basel). 2019 Sep 10;19(18):3905. doi: 10.3390/s19183905.
3
Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks.动态无线传感器网络中简单有效的安全群组通信
边缘计算技术在水文空间分析和生态规划中的应用。
Int J Environ Res Public Health. 2021 Aug 8;18(16):8382. doi: 10.3390/ijerph18168382.
4
Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication.自适应鲁棒控制器设计用于具有未知时变时滞的混沌系统的多状态同步及其在安全通信中的应用。
Sensors (Basel). 2021 Jan 2;21(1):254. doi: 10.3390/s21010254.
Sensors (Basel). 2019 Apr 22;19(8):1909. doi: 10.3390/s19081909.