ABSTRACT
The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making the IoT an attractive target for exploitation. One of the attacks that IoT devices can suffer from is device impersonation. To verify that the sender of a piece of information is who it claims to be, digital signatures are a solution. Applying digital signatures requires some overhead, and that overhead may impact the performance of an IoT network. In this paper, we observed the computational impact of using the Elliptic Curve Digital Signature Algorithm (ECDSA) to create and verify IoT devices' digital signatures. We used two criteria to evaluate the performance of our small IoT network: the packet loss and the average time needed to sign and verify a packet in a small IoT network. We also analyzed the same system without using digital signatures. Our evaluations show that in a small IoT sensor network, ECDSA computational impact is quite low.
- Seyed Farhad Aghili, Maede Ashouri-Talouki, and Hamid Mala. 2018. DoS, Impersonation and De-Synchronization Attacks Against an Ultra-Lightweight RFID Mutual Authentication Protocol for IoT. The Journal of Supercomputing 74, 1 (2018), 509--525.Google ScholarDigital Library
- Zainab Alansari, Safeeullah Soomro, Mohammad Riyaz Belgaum, and Shahaboddin Shamshirband. 2018. The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues. In Progress in Advanced Computing and Intelligent Engineering, Khalid Saeed, Nabendu Chaki, Bibudhendu Pati, Sambit Bakshi, and Durga Prasad Mohapatra (Eds.). Springer Singapore, Singapore, 675--685.Google Scholar
- Abdullah Aziz, Olov Schelén, and Ulf Bodin. 2020. A Study on Industrial IoT for the Mining Industry: Synthesized Architecture and Open Research Directions. IoT 1, 2 (2020), 529--550. https://www.mdpi.com/2624-831X/1/2/29Google ScholarCross Ref
- Zhihua Cui, Xianghua Xu, Fei Xue, Xingjuan Cai, Yang Cao, Wensheng Zhang, and Jinjun Chen. 2020. Personalized Recommendation System Based on Collaborative Filtering for IoT Scenarios. IEEE Transactions on Services Computing 13, 4 (2020), 685--695. Google ScholarCross Ref
- Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. 2019. Trust Management Techniques for the Internet of Things: A Survey. IEEE Access 7 (2019), 29763--29787. Google ScholarCross Ref
- Espressif. 2022. ESP-NOW: Espressif's Wireless Communication Protocol. https://www.espressif.com/en/news/ESP-NOWGoogle Scholar
- Espressif. 2022. ESP32 Series. https://www.espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdfGoogle Scholar
- Espressif. 2022. Espressif. https://www.espressif.comGoogle Scholar
- Saman Forouzandeh, Atae Rezaei Aghdam, Mostafa Barkhordari, Seyed Amin Fahimi, Mohsen Karzari Vayqan, Soran Forouzandeh, and Ehsan Ghasem Khani. 2017. Recommender System for Users of Internet of Things (IoT). IJCSNS 17, 8 (2017), 46.Google Scholar
- Asma Haroon, Sana Akram, Munam Ali Shah, and Abdul Wahid. 2017. E-Lithe: A Lightweight Secure DTLS for IoT. In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). Toronto, Canada, 1--5. Google ScholarCross Ref
- Mahmud Hossain, Shahid Noor, and Ragib Hasan. 2017. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things. In 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). San Fransisco, United States, 109--116. Google ScholarCross Ref
- Apurva S. Kittur, Ashu Jain, Alwyn Roshan Pais, Sabu M Thampi, Ínez Pérez Gregorio Mart, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, and Félix Gómez Mármol. 2017. Fast Verification of Digital Signatures in IoT. In Security in Computing and Communications. Springer Singapore, Singapore, 16--27.Google Scholar
- Neal Koblitz. 1994. A Course in Number Theory and Cryptography (2 ed.). Springer.Google Scholar
- Nagendra Modadugu and Eric Rescorla. 2004. The Design and Implementation of Datagram TLS. In NDSS.Google Scholar
- Dina Nawara and Rasha Kashef. 2020. IoT-based Recommendation Systems - An Overview. In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). Vancouver, Canada, 1--7. Google ScholarCross Ref
- George Oikonomou, Simon Duquennoy, Atis Elsts, Joakim Eriksson, Yasuyuki Tanaka, and Nicolas Tsiftes. 2022. The Contiki-NG Open Source Operating System for Next Generation IoT Devices. SoftwareX 18 (2022), 101089. Google ScholarCross Ref
- Satya Shah, Richard Rutherford, and Sarath Menon. 2020. Emerging Technologies of IoT Usage in Global Logistics. In 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM). Dubai, United Arab Emirates, 251--257. Google ScholarCross Ref
- Standards for Efficient Cryptography Group. 2022. Standards for Efficient Cryptography Group. https://www.secg.org/.Google Scholar
- Manuel Suárez-Albela, Tiago M. Fernández-Caramés, Paula Fraga-Lamas, and Luis Castedo. 2018. A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices. In 2018 Global Internet of Things Summit (GIoTS). Bilbao, Spain, 1--6. Google ScholarCross Ref
- Manuel Suárez-Albela, Paul Fraga-Lamas, and Tiago M. Fernández-Caramés. 2018. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 18, 11 (2018). Google ScholarCross Ref
- Lo'ai Tawalbeh, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. 2020. IoT Privacy and Security: Challenges and Solutions. Applied Sciences 10, 12 (2020). Google ScholarCross Ref
- Lawrence Washington. 2008. Elliptic Curves: Number Theory and Cryptography, Second Edition. CRC Press.Google ScholarCross Ref
Index Terms
- Analysis of ECDSA's Computational Impact on IoT Network Performance
Recommendations
Secure authentication scheme for IoT and cloud servers
Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for performing information exchange. Owing to the immense development of this technology, embedded devices ...
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication
AbstractInternet of Things (IoT) networks are vulnerable to various security threats, especially in client authentication. The current authentication methods require significant resources and are vulnerable to specific attacks. The Non-Interactive Zero ...
SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
Internet of things connect unlimited number of heterogeneous devices in order to facilitate services and hence touching most of daily life fields. However, security concerns are a major obstacle to the development and rapid deployment of this high ...
Comments