2021
DOI: 10.11591/ijeecs.v22.i1.pp507-515
|View full text |Cite
|
Sign up to set email alerts
|

Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device

Abstract: Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
(29 reference statements)
0
2
0
Order By: Relevance
“…Instead of using symmetric keys, asymmetric key encryption utilizes two keys: one public key to encrypt and one private key to decrypt [25]- [33]. RSA is a widely recognized example of asymmetric cryptography [33], and numerous researchers have favored it as the most popular and well-known algorithm.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead of using symmetric keys, asymmetric key encryption utilizes two keys: one public key to encrypt and one private key to decrypt [25]- [33]. RSA is a widely recognized example of asymmetric cryptography [33], and numerous researchers have favored it as the most popular and well-known algorithm.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Instead of using symmetric keys, asymmetric key encryption utilizes two keys: one public key to encrypt and one private key to decrypt [25]- [33]. RSA is a widely recognized example of asymmetric cryptography [33], and numerous researchers have favored it as the most popular and well-known algorithm. Furthermore, RSA is included in asymmetric encryption, which also encompasses the elliptic curve Bulletin of Electr Eng & Inf ISSN: 2302-9285  cryptography algorithm [27]- [32].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%