Skip to main content

Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System

  • Conference paper
  • First Online:
Sustainable Communication Networks and Application (ICSCN 2019)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 39))

Abstract

Data integrity and data security are major issues while transferring data in any Internet of Things (IoT) application. The sensor node as an edge node or end node collects information from the physical environment which is to be preprocessed and sent to the nearby server or cloud server for storage or for further processing. Because of the constrained resources at the edge node, it is essential to perform edge analytics with methods which utilize less power or can be performed with less computational complexity with limited memory. In this scenario, the data security related methodology should use lightweight encryption method for providing data security to avoid the attacks on data integrity while transmitting. In our Smart Goods Transport IoT system, we are using lightweight encryption method Elliptical Curve Cryptography (ECC) using ElGamal encryption scheme to provide strong authentication and data security while in transit.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wenger, E., Unterluggauer, T., Werner, M.: 8/16/32 shades of elliptic curve cryptography on embedded processors. In: Progress in Cryptology INDOCRYPT 2013. Lecture Notes in Computer Science. Springer International Publishing, vol. 8250, pp. 244–261 (2013)

    Google Scholar 

  2. Alrimeih, H., Rakhmatov, D.: Fast and flexible hardware support for ECC over multiple standard prime fields. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 99, 1–14 (2014)

    Google Scholar 

  3. Höller, A., Druml, N., Kreiner, C., Steger, C., Felicijan, T.: Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications. In: 51th ACM/EDAC/IEEE Design Automation Conference (DAC), June 2014

    Google Scholar 

  4. Aigner, H., Bock, H., Hütter, M., Wolkerstorfer, J.: A low-cost ECC coprocessor for smartcards. In: Cryptographic Hardware and Embedded Systems (CHES). Lecture Notes in Computer Science, vol. 3156, pp. 107–118. Springer, Heidelberg (2004)

    Google Scholar 

  5. Hein, D., Wolkerstorfer, J., Felber, N.: ECC is ready for RFID a proof in silicon. In: Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5381, pp. 401–413. Springer, Heidelberg (2009)

    Google Scholar 

  6. Plos, T., Hutter, M., Feldhofer, M., Stiglic, M., Cavaliere, F.: Security enabled near-field communication tag with flexible architecture supporting asymmetric cryptography. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 21(11), 1965–1974 (2013)

    Article  Google Scholar 

  7. Koblitz, N.: Introduction to Elliptic Curves and Modular Forms. Springer, New York (1984)

    Book  Google Scholar 

  8. Lang, S., Trotter, H.: Primitive points on elliptic curves. Bull. Amer. Math. Soc 83, 289–292 (1977)

    Article  MathSciNet  Google Scholar 

  9. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. Springer, Heidelberg (2004)

    Google Scholar 

  10. Guajardo, J., Kumar, S., Paar, C., Pelzl, J.: Efficient software implementation of finite fields with applications to cryptography. Acta Appl. Math. 93(1–3), 3–32 (2006)

    Article  MathSciNet  Google Scholar 

  11. Akishita, T., Hiwatari, H.: Compact hardware implementations of the 128-bit Blockcipher CLEFIA. In: Proceedings of Symposium on Cryptography and Information Security – SCIS 2011 (2011). (in Japanese)

    Google Scholar 

  12. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  13. Poschmann, A.: Lightweight Cryptography – Cryptographic Engineering for a Pervasive World. In IACR ePrint archive 2009/516 (2009)

    Google Scholar 

  14. Satoh, A., Morioka, S.: Hardware-focused performance comparison for the standard block ciphers AES, Camellia, and Triple-DES. In: Boyd, C., Mao, W. (eds.) Proceedings of ISC 2003, vol. 2851, pp. 252–266, Springer, Heidelberg (2003)

    Google Scholar 

  15. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of light weight cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Joglekar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joglekar, J., Bhutani, S., Patel, N., Soman, P. (2020). Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System. In: Karrupusamy, P., Chen, J., Shi, Y. (eds) Sustainable Communication Networks and Application. ICSCN 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-030-34515-0_28

Download citation

Publish with us

Policies and ethics