Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things

Abderrazak Abdaoui, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, Mohsen Guizani*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

19 Citations (Scopus)

Abstract

The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy, and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for IoT systems. In this article, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests, such as: frequency test, frequency test with mono block, run test, discrete Fourier transform (DFT) test, and advanced DFT test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms, such as Pollard's ρ and Baby-step Giant-step, to evaluate the vulnerability of the proposed scheme.

Original languageEnglish
Pages (from-to)9987-9998
Number of pages12
JournalIEEE Internet of Things Journal
Volume9
Issue number12
DOIs
Publication statusPublished - 15 Jun 2022

Keywords

  • Cryptography
  • Elliptic curve cryptography (ECC)
  • Fuzzy logic
  • Internet of Things (IoT)
  • Pollard's I
  • Pseudorandom numbers

Fingerprint

Dive into the research topics of 'Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things'. Together they form a unique fingerprint.

Cite this