2016 Third International Conference on Systems of Collaboration (SysCo) 2016
DOI: 10.1109/sysco.2016.7831326
|View full text |Cite
|
Sign up to set email alerts
|

New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(30 citation statements)
references
References 2 publications
0
17
0
1
Order By: Relevance
“…Moreover, RSA uses common public-key cryptography algorithms, and EC is very useful in pervasive computing [60,61]. Furthermore, three variants of EC algorithms are implemented-ECDAC for digital signature, ECIES for data encryption, and ECDH for key exchange [46].…”
Section: Security Threats and Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, RSA uses common public-key cryptography algorithms, and EC is very useful in pervasive computing [60,61]. Furthermore, three variants of EC algorithms are implemented-ECDAC for digital signature, ECIES for data encryption, and ECDH for key exchange [46].…”
Section: Security Threats and Solutionsmentioning
confidence: 99%
“…Additionally, the lightweight concept for IoT is extended to lightweight attribute-based encryption schema for cloud applications [40][41][42], lightweight collaborative key management protocol [43], lightweight protocol for smart home authentication and key-session exchange [44,45]. Many IoT protocols have been proposed for different ISO layers, such as link layer (802.15.4, PLC), network layer (RPL, 6LoWPA), presentation layer (TLS, 802.1AR, 802.1X), and application layer (CoAP) [46]. Since 6LoWPA takes advantage of the IEEE 802.15.4 standard for low-rate wireless networks and IPv6, it provides low processing and a lack of authentication as an advantage and a disadvantage, respectively [9].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the works related to MQTT protocol available in the literature focus on performance evaluation (Fehrenbach, 2017;Gündoğan et al, 2018;Lee et al, 2013;Luzuriaga et al, 2015;Scalagent, 2015;Thangavel et al, 2014;Yokotani & Sasaki, 2016), proposing security enhancements to the existing protocol (Mektoubi et al, 2016;Shin et al, 2016;Singh et al, 2015), formal modelling (Aziz, 2016;Houimli et al, 2017) and security evaluation (Andy et al, 2017;Firdous et al, 2017;Perrone et al, 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…[25] have proposed another security mechanism based on ECC which focuses on data confidentiality with less resource requirement compared to TLS. Furthermore, Mektoubi et.al [26] have performed a study comparing RSA and ECC to protect the data confidentiality and provide good non-repudiation. In the case of constrained devices, Niruntasukrat et.al.…”
Section: E Botnet Over Mqttmentioning
confidence: 99%