2020
DOI: 10.19101/ijatee.2019.650070
|View full text |Cite
|
Sign up to set email alerts
|

Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis

Abstract: The Internet of Things (IoT) is being evolved through four-dimensional or pillars such as individuals, procedures, information and possessions named the Internet of Everything (IoE). It seems IoT has only one component, which is things. We partake to explain in IoE, about the connection of the things and people, collection of the technique. However, the harmless data and intelligent connection of objects and constitutional items work on the internet for the decision as shown in Figure 1. All components are dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…Data analysis and comparison reveal that ECC is more efficient and secure than RSA. Finally, the study finishes by emphaizies the benefits of ECC in IoT systems and suggesting future enhancements and research initiatives in this field [38].…”
Section: Literature Surveymentioning
confidence: 97%
“…Data analysis and comparison reveal that ECC is more efficient and secure than RSA. Finally, the study finishes by emphaizies the benefits of ECC in IoT systems and suggesting future enhancements and research initiatives in this field [38].…”
Section: Literature Surveymentioning
confidence: 97%
“…A comparative study in [10] involved showing how the security model performance in IoT environments can be improved by using ECC instead of RSA, this study was implemented upon evaluation of the smart-door IoT system using Cryptool2 as a simulation tool. Yasin Genç [11] proposed a new ECDSA algorithm that involved eliminating modular inversion arithmetic operation in two signature stages, the signature generation stage and verification stage, the elimination improves the run time of the ECDSA algorithm, and claimed the modification doesn't reduce the security efficiency.…”
Section: Related Workmentioning
confidence: 99%