Skip to main content

Ensuring Data Integrity Using Digital Signature in an IoT Environment

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 451))

Abstract

The Internet of Things (IoT) devices produce large amounts of data which increase their susceptibility to cyber attacks. Data Integrity attack is a serious limitation to the evolution of IoT as it leads to bad financial impact or even human fatality. In this work, we will focus on ensuring exchanged data integrity using digital signature for public key cryptography. Elliptical Curve Digital Signature Algorithm (ECDSA) is gaining more attention than RSA in IoT for its same level of security with smaller keys. ECDSA is applied on our predefined Software Defined Architecture (SDN).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. El-hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)

    Article  Google Scholar 

  2. Lu, Y., Xu, L.D.: Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE IoT J. 6(2), 2103–2115 (2019)

    Google Scholar 

  3. Aman, M.N., Sikdar, B., Chua, K.C., Ali, A.: Low power data integrity in IoT systems. IEEE IoT J. 5(4), 3102–3113 (2018)

    Google Scholar 

  4. Liu, B., Yu, X.L., Chen, S., et al.: Blockchain based data integrity service framework for IoT data. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 468–475. IEEE (2017)

    Google Scholar 

  5. Dua, A., Chaudhary, R., Aujla, G.S.: LEASE: lattice and ECC-based authentication and integrity verification scheme in E-healthcare. In: IEEE Global Communications Conference (GLOBECOM), vol. 2018, pp. 1–6. IEEE (2018)

    Google Scholar 

  6. Dubal, M., Deshmukh, A.: Achieving authentication and integrity using elliptic curve cryptography architecture. Int. J. Comput. Appl. 69(24), 11–15 (2013)

    Google Scholar 

  7. Kammoun, N., Abassi, R., Guemara, S.: Towards a new clustering algorithm based on trust management and edge computing for IoT. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), vol. 2019, pp. 1570–1575. IEEE (2019)

    Google Scholar 

  8. Kammoun, N., Abassi, R., Guemara El Fatmi, S., Mosbah, M.: A lightweight authentication scheme for SDN-based architecture in IoT. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA-2021, pp. 336–345. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75078-7_34

    Chapter  Google Scholar 

  9. Toradmalle, D., Singh, R., Shastri, H., et al.: Prominence of ECDSA over RSA digital signature algorithm. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), pp. 253–257. IEEE (2018)

    Google Scholar 

  10. Gupta, P., Sinha, A., Srivastava, P.K., Perti, A., Singh, A.K.: Security implementations in IoT using digital signature. In: Favorskaya, M.N., Mekhilef, S., Pandey, R.K., Singh, N. (eds.) Innovations in Electrical and Electronic Engineering: Proceedings of ICEEE 2020, pp. 523–535. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-4692-1_40

  11. Suárez-albela, M., Fernández-caramés, T.M., Fraga-Lamas, P.: A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: Global Internet of Things Summit (GIoTS), vol. 2018, pp. 1–6. IEEE (2018)

    Google Scholar 

  12. Chattaraj, D., Saha, S., Bera, B., et al.: On the design of blockchain-based access control scheme for software defined networks. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE INFOCOM 2020, pp. 237–242. IEEE (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadia Kammoun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kammoun, N., ben Chehida Douss, A., Abassi, R., Guemara el Fatmi, S. (2022). Ensuring Data Integrity Using Digital Signature in an IoT Environment. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 451. Springer, Cham. https://doi.org/10.1007/978-3-030-99619-2_46

Download citation

Publish with us

Policies and ethics