OPUS


Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 1 of 15
Back to Result List

Security In IoT : Based On Elliptic Curve

  • The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with each other. These embedded devices are internet-enabled, which collect, share, and analyze data without any human interventions. The integration of IoT technology into the human environment, such as industries, agriculture, and health sectors, is expected to improve the way of life and businesses. The emerging technology possesses challenges and numerous security threats. On these grounds, it is a must to strengthen the security of IoT technology to avoid any compromise, which affects human life. In contrast to implementing traditional cryptosystems on IoT devices, an elliptic curve cryptosystem (ECC) is used to meet the limited resources of the devices. ECC is an elliptic curve-based public-key cryptography which provides equivalent security with shorter key size compared to other cryptosystems such as Rivest–Shamir–Adleman (RSA). The security of an ECC hinges on the hardness to solve the elliptic curve discrete logarithm problem (ECDLP). ECC is faster and easier to implement and also consumes less power and bandwidth. ECC is incorporated in internationally recognized standards for lightweight applications due to the benefits ECC provides.

Download full text files

  • masters.pdf
    eng

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Author:Emmanuel Sarkodie Akrasi
Advisor:Klaus Dohmen, Peter Tittmann
Document Type:Master's Thesis
Language:English
Year of Completion:2020
Granting Institution:Hochschule Mittweida
Release Date:2021/11/09
GND Keyword:Internet der Dinge; Kryptologie; Kryptosystem
Note:
Printexemplar Präsenzbestand
Institutes:Angewandte Computer‐ und Bio­wissen­schaften
DDC classes:005.82 elektronischer Fingerabdruck, elektronische Unterschrift, Krytoanalyse, Identitätsverwaltung
Open Access:Innerhalb der Hochschule
Licence (German):License LogoUrheberrechtlich geschützt