
Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things
Author(s) -
Sumanth Koppula,
Jayabhaskar Muthukuru
Publication year - 2016
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v6i3.pp1002-1010
Subject(s) - computer science , computer security , scheme (mathematics) , digital signature , internet of things , the internet , authentication (law) , elliptic curve digital signature algorithm , key (lock) , elliptic curve cryptography , set (abstract data type) , signature (topology) , resource (disambiguation) , public key cryptography , computer network , world wide web , mathematics , hash function , encryption , mathematical analysis , geometry , programming language
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is signicant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.