首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:COMPARISON OF ECC AND RSA ALGORITHMS IN IOT DEVICES
  • 本地全文:下载
  • 作者:ZEINAB VAHDATI ; SHARIFAH MD YASIN ; ALI GHASEMPOUR
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2019
  • 卷号:97
  • 期号:16
  • 页码:4293-4308
  • 出版社:Journal of Theoretical and Applied
  • 摘要:IoT is the evolution of the internet. Concerning tight communication between the individual and business, number of IoT nodes are rapidly increasing. Most of the services in IoT heavily rely on security mechanisms that pose security imperative for embedded devices in IoT. The failures in IoT can have severe results; consequently, the research toward security concerns are of extreme significance in IoT. Preserving the confidentiality and privacy, ensuring the availability of the services that are proposed by IoT ecosystem, assuring the safety of the assets in IoT like devices, data, infrastructures, and users, are the main objectives in IoT security. The significant issue that makes IoT devices vulnerable is the lack of an appropriate security mechanism to preserve data. Attackers can exploit these weaknesses to obtain access to valuable data. Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.
  • 关键词:Elliptic Curve Cryptography; ECC; RSA; Internet of Things (IoT); Security Services
国家哲学社会科学文献中心版权所有