TY - GEN
T1 - Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
AU - Abdaoui, Abderrazak
AU - Erbad, Aiman
AU - Al-Ali, Abdulla
AU - Mohamed, Amr
AU - Guizani, Mohsen
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/12
Y1 - 2020/12
N2 - The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoT environment. In this paper, we present a novel method of authentication and encryption based on Elliptic Curve Cryptography (ECC) and on random numbers generated by fuzzy logic for the improvement of the authentication and the encryption in IoT systems. We evaluate our novel key generation method using standard randomness tests such as: Frequency test, Frequency test with mono block, run test, discrete Fourier transform test and advanced discrete Fourier transform test. Our results show superior performance.
AB - The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoT environment. In this paper, we present a novel method of authentication and encryption based on Elliptic Curve Cryptography (ECC) and on random numbers generated by fuzzy logic for the improvement of the authentication and the encryption in IoT systems. We evaluate our novel key generation method using standard randomness tests such as: Frequency test, Frequency test with mono block, run test, discrete Fourier transform test and advanced discrete Fourier transform test. Our results show superior performance.
KW - Cryptography
KW - Elliptic Curve Cryptography
KW - Fuzzy logic
KW - Internet-of-Things
KW - Pseudo Random Sequences
UR - http://www.scopus.com/inward/record.url?scp=85113356316&partnerID=8YFLogxK
U2 - 10.1109/CSCI51800.2020.00194
DO - 10.1109/CSCI51800.2020.00194
M3 - Conference contribution
AN - SCOPUS:85113356316
T3 - Proceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
SP - 1041
EP - 1047
BT - Proceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
Y2 - 16 December 2020 through 18 December 2020
ER -