Design of Secure Communication Schemes to Provide Authentication and Integrity Among the IoT Devices
The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. The setup is subjected to various real-time attacks using Kali Linux to capture the data and then analyzed for code injection, malicious attacker impersonation, and many more. By developing a lightweight solution for a smart network, the attack rate can be reduced and the strength of the cryptographic solution can be increased.
Rao, Vidya Dr., "Design of Secure Communication Schemes to Provide Authentication and Integrity Among the IoT Devices" (2022). Technical Collection. 32.