Comparison of ECC and RSA algorithms in IOT devices

IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can hav...

Full description

Saved in:
Bibliographic Details
Main Authors: Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad
Format: Article
Language:English
Published: Little Lion Scientific 2019
Online Access:http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf
http://psasir.upm.edu.my/id/eprint/80984/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.80984
record_format eprints
spelling my.upm.eprints.809842020-10-14T20:51:52Z http://psasir.upm.edu.my/id/eprint/80984/ Comparison of ECC and RSA algorithms in IOT devices Vahdati, Zeinab Md Yasin, Sharifah Nesheli, Ali Ghasempour Salehi, Mohammad IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can have severe results; consequently, the research toward security concerns are of extreme significance in IoT. Preserving the confidentiality and privacy, ensuring the availability of the services that are proposed by IoT ecosystem, assuring the safety of the assets in IoT like devices, data, infrastructures, and users, are the main objectives in IoT security. The significant issue that makes IoT devices vulnerable is the lack of an appropriate security mechanism to preserve data. Attackers can exploit these weaknesses to obtain access to valuable data. Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting. Little Lion Scientific 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf Vahdati, Zeinab and Md Yasin, Sharifah and Nesheli, Ali Ghasempour and Salehi, Mohammad (2019) Comparison of ECC and RSA algorithms in IOT devices. Journal of Theoretical and Applied Information Technology, 97 (16). pp. 4293-4308. ISSN 1992-8645; ESSN: 1817-3195
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can have severe results; consequently, the research toward security concerns are of extreme significance in IoT. Preserving the confidentiality and privacy, ensuring the availability of the services that are proposed by IoT ecosystem, assuring the safety of the assets in IoT like devices, data, infrastructures, and users, are the main objectives in IoT security. The significant issue that makes IoT devices vulnerable is the lack of an appropriate security mechanism to preserve data. Attackers can exploit these weaknesses to obtain access to valuable data. Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.
format Article
author Vahdati, Zeinab
Md Yasin, Sharifah
Nesheli, Ali Ghasempour
Salehi, Mohammad
spellingShingle Vahdati, Zeinab
Md Yasin, Sharifah
Nesheli, Ali Ghasempour
Salehi, Mohammad
Comparison of ECC and RSA algorithms in IOT devices
author_facet Vahdati, Zeinab
Md Yasin, Sharifah
Nesheli, Ali Ghasempour
Salehi, Mohammad
author_sort Vahdati, Zeinab
title Comparison of ECC and RSA algorithms in IOT devices
title_short Comparison of ECC and RSA algorithms in IOT devices
title_full Comparison of ECC and RSA algorithms in IOT devices
title_fullStr Comparison of ECC and RSA algorithms in IOT devices
title_full_unstemmed Comparison of ECC and RSA algorithms in IOT devices
title_sort comparison of ecc and rsa algorithms in iot devices
publisher Little Lion Scientific
publishDate 2019
url http://psasir.upm.edu.my/id/eprint/80984/1/IOT.pdf
http://psasir.upm.edu.my/id/eprint/80984/
_version_ 1681490838054502400
score 13.214268