2019
DOI: 10.3390/electronics8111238
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators

Abstract: Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Reference [20] developed a customizable encryption system that allowed users to choose their preferred encryption method from a range of options specified in the FPGA configuration file, hence enhancing the flexibility of the system. Reference [21] suggested a hybrid protocol architecture for Short Message Services (SMS) that incorporates AES and Rivest Cipher 4 (RC4) algorithms to enhance the security of smart houses. This solution offered secure communication in the IoT context, ensuring confidentiality and randomness.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [20] developed a customizable encryption system that allowed users to choose their preferred encryption method from a range of options specified in the FPGA configuration file, hence enhancing the flexibility of the system. Reference [21] suggested a hybrid protocol architecture for Short Message Services (SMS) that incorporates AES and Rivest Cipher 4 (RC4) algorithms to enhance the security of smart houses. This solution offered secure communication in the IoT context, ensuring confidentiality and randomness.…”
Section: Related Workmentioning
confidence: 99%
“…Let's set 𝑡 𝐴−𝐵 (𝑛𝑒𝑡 .) to 30ms and use the delay time of [12] in Table 1 for a standard TLS handshake (67.5 ms without network latencies). We have 3 Client-authenticated TLS handshakes in Eq.…”
Section: Time Estimation For Token Generationmentioning
confidence: 99%
“…The maximum value is presented at the point where the acceleration line intersects the abscissa axis. For this reason, to evaluate this function in T 2 the maximum velocity is obtained as Equation (4). Finally, the angular position function is calculated as in Equation 5.…”
Section: Parabolic Velocity Profilementioning
confidence: 99%
“…The statement takes into account the advantages of using the FPGA as a controller. For example, FPGAs are flexible devices that have the ability of reconfigurable parallel processing [4,5] and, it is precisely the aforementioned aspect that allows the realization of a system of logical operations in parallel, which considerably reduces the computation time [6]. Finally, the FPGA has a comparatively simpler design cycle to be managed and requires less manual intervention [7,8].…”
Section: Introductionmentioning
confidence: 99%