2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA) 2019
DOI: 10.1109/iccista.2019.8830653
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The authors of [54] propose the use of ECCDH elliptical encryption, as an alternative to AES À 128 À CTR. This mechanism requires the server and the IoT device to share two pre-configured secret parameters.…”
Section: Confidentialitymentioning
confidence: 99%
See 3 more Smart Citations
“…The authors of [54] propose the use of ECCDH elliptical encryption, as an alternative to AES À 128 À CTR. This mechanism requires the server and the IoT device to share two pre-configured secret parameters.…”
Section: Confidentialitymentioning
confidence: 99%
“…During the initialization phase, the device and server must exploit such two secret parameters to generate the encryption keys. In order to also guarantee data integrity, in [54], the elliptic curves are also used for the calculation of the MIC. After generating the necessary keys, the device must encrypt the packet and then sign it.…”
Section: Confidentialitymentioning
confidence: 99%
See 2 more Smart Citations
“…The symmetric ciphers' elements are entity authentication, encryption, checking message integrity, and etc., whilst the management of key and nonrepudiation are further functions supplied via asymmetric ciphers [14]. Lightweight Elliptic curve is asymmetric cipher that capable of ensuring both confidentiality and authentication, however, it requires more consumption of memory and larger size of key which led to make it less popular [15] [16].…”
Section: Lightweight Cryptographic Algorithmsmentioning
confidence: 99%