Comparison of ECC and RSA algorithms in IOT devices
IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can hav...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Little Lion Scientific
2019
|
Online Access: | http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf http://psasir.upm.edu.my/id/eprint/80984/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.80984 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.809842020-10-14T20:51:52Z http://psasir.upm.edu.my/id/eprint/80984/ Comparison of ECC and RSA algorithms in IOT devices Vahdati, Zeinab Md Yasin, Sharifah Nesheli, Ali Ghasempour Salehi, Mohammad IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can have severe results; consequently, the research toward security concerns are of extreme significance in IoT. Preserving the confidentiality and privacy, ensuring the availability of the services that are proposed by IoT ecosystem, assuring the safety of the assets in IoT like devices, data, infrastructures, and users, are the main objectives in IoT security. The significant issue that makes IoT devices vulnerable is the lack of an appropriate security mechanism to preserve data. Attackers can exploit these weaknesses to obtain access to valuable data. Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting. Little Lion Scientific 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf Vahdati, Zeinab and Md Yasin, Sharifah and Nesheli, Ali Ghasempour and Salehi, Mohammad (2019) Comparison of ECC and RSA algorithms in IOT devices. Journal of Theoretical and Applied Information Technology, 97 (16). pp. 4293-4308. ISSN 1992-8645; ESSN: 1817-3195 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can have severe results; consequently, the research toward security concerns are of extreme significance in IoT. Preserving the confidentiality and privacy, ensuring the availability of the services that are proposed by IoT ecosystem, assuring the safety of the assets in IoT like devices, data, infrastructures, and users, are the main objectives in IoT security. The significant issue that makes IoT devices vulnerable is the lack of an appropriate security mechanism to preserve data. Attackers can exploit these weaknesses to obtain access to valuable data. Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device
efficiency and decrease the risk of sensitive data exposure. Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting. |
format |
Article |
author |
Vahdati, Zeinab Md Yasin, Sharifah Nesheli, Ali Ghasempour Salehi, Mohammad |
spellingShingle |
Vahdati, Zeinab Md Yasin, Sharifah Nesheli, Ali Ghasempour Salehi, Mohammad Comparison of ECC and RSA algorithms in IOT devices |
author_facet |
Vahdati, Zeinab Md Yasin, Sharifah Nesheli, Ali Ghasempour Salehi, Mohammad |
author_sort |
Vahdati, Zeinab |
title |
Comparison of ECC and RSA algorithms in IOT devices |
title_short |
Comparison of ECC and RSA algorithms in IOT devices |
title_full |
Comparison of ECC and RSA algorithms in IOT devices |
title_fullStr |
Comparison of ECC and RSA algorithms in IOT devices |
title_full_unstemmed |
Comparison of ECC and RSA algorithms in IOT devices |
title_sort |
comparison of ecc and rsa algorithms in iot devices |
publisher |
Little Lion Scientific |
publishDate |
2019 |
url |
http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf http://psasir.upm.edu.my/id/eprint/80984/ |
_version_ |
1681490838054502400 |
score |
13.214268 |