2018
DOI: 10.1049/iet-cdt.2018.5098
|View full text |Cite
|
Sign up to set email alerts
|

Low‐complexity and differential power analysis (DPA)‐resistant two‐folded power‐aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT‐connected devices

Abstract: The hardware security issues are emerging in crypto-algorithms of embedded portable Internet-of-Things-Devices (IoTD). The communication protocols/standards including MQTT (Message Queuing Telemetry Transport) are enforcing additional cares in device-to-system design perspectives. Due to computation-capacity limitations (CCLs) in battery-operated IoTD, heavy-duty crypto-algorithms are prohibited. This results in compromised hardware using lightweight algorithms. In this study, a new implementation schema for h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 31 publications
(50 reference statements)
0
5
0
Order By: Relevance
“…Literature analysis indicates that lightweight algorithms are suitable for embedded systems due to the limited memory and power availability. A low computational RSA with two power‐aware implementations is used in [22] for ensuring strong security in the Internet of Things (IoT) devices without increasing the complexity. A secured, time and energy‐efficient algorithm is developed in [23], which can overcome the limitations of the white‐box cryptography schemes.…”
Section: Data Security and Encryptionmentioning
confidence: 99%
“…Literature analysis indicates that lightweight algorithms are suitable for embedded systems due to the limited memory and power availability. A low computational RSA with two power‐aware implementations is used in [22] for ensuring strong security in the Internet of Things (IoT) devices without increasing the complexity. A secured, time and energy‐efficient algorithm is developed in [23], which can overcome the limitations of the white‐box cryptography schemes.…”
Section: Data Security and Encryptionmentioning
confidence: 99%
“…Furthermore, the hidden data is evaluated while sending and receiving the data. Further, the performance of the GSO optimization model is compared with the stateof-the-art models like AES [10], RSA [11], ECC [12], ECC-Crow Search Algorithm (CS) [13], ECC-PSO [14], and ECC-GO [15] by concerning PSNR, Mean Square Error (MSE), Bit Error Rate (BER), and Spectral Similarity Index (SSI).…”
Section: Optimal Key Selection Modelmentioning
confidence: 99%
“…If the number of devices in the certain communication increases, then it creates difficult issues such as higher hardware utilization and delay. Therefore, theses block ciphers aren't suitable for the low area applications [46].…”
Section: Introductionmentioning
confidence: 99%