TY - CHAP
T1 - Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
AU - Harbi, Yasmine
AU - Aliouat, Zibouda
AU - Harous, Saad
AU - Bentaleb, Abdelhak
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - In recent years, Internet of Things (IoT) has made extraordinary progress in human lives from healthcare applications to daily chores. The IoT enables everyday object to be connected to the Internet. These devices are embedded with sensors and actuators in order to collect and share data. However, the transmission of the collected data may face several security and privacy concerns. To overcome this problem, we propose a Secure Data Transmission Scheme (SDTS) that improves communication security in cluster-based Wireless Sensor Networks (WSNs). The SDTS is based on Elliptic Curve Cryptography (ECC) due to its ability to provide high security level with small key size. The proposed method achieves several security requirements including confidentiality, integrity, and authentication. Moreover, it resists different security attacks like brute force attack, replay attack, and sinkhole attack. The performance analysis shows that SDTS is relatively efficient in term of communication cost.
AB - In recent years, Internet of Things (IoT) has made extraordinary progress in human lives from healthcare applications to daily chores. The IoT enables everyday object to be connected to the Internet. These devices are embedded with sensors and actuators in order to collect and share data. However, the transmission of the collected data may face several security and privacy concerns. To overcome this problem, we propose a Secure Data Transmission Scheme (SDTS) that improves communication security in cluster-based Wireless Sensor Networks (WSNs). The SDTS is based on Elliptic Curve Cryptography (ECC) due to its ability to provide high security level with small key size. The proposed method achieves several security requirements including confidentiality, integrity, and authentication. Moreover, it resists different security attacks like brute force attack, replay attack, and sinkhole attack. The performance analysis shows that SDTS is relatively efficient in term of communication cost.
KW - Privacy
KW - Security
KW - Security attacks
KW - Security requirements
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85062899263&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85062899263&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-05481-6_3
DO - 10.1007/978-3-030-05481-6_3
M3 - Chapter
AN - SCOPUS:85062899263
T3 - Lecture Notes in Networks and Systems
SP - 34
EP - 46
BT - Lecture Notes in Networks and Systems
PB - Springer
ER -