Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication

Abderrazak Abdaoui, Aiman Erbad, Abdulla Al-Ali, Amr Mohamed, Mohsen Guizani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoT environment. In this paper, we present a novel method of authentication and encryption based on Elliptic Curve Cryptography (ECC) and on random numbers generated by fuzzy logic for the improvement of the authentication and the encryption in IoT systems. We evaluate our novel key generation method using standard randomness tests such as: Frequency test, Frequency test with mono block, run test, discrete Fourier transform test and advanced discrete Fourier transform test. Our results show superior performance.

Original languageEnglish
Title of host publicationProceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1041-1047
Number of pages7
ISBN (Electronic)9781728176246
DOIs
Publication statusPublished - Dec 2020
Event2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020 - Las Vegas, United States
Duration: 16 Dec 202018 Dec 2020

Publication series

NameProceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020

Conference

Conference2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
Country/TerritoryUnited States
CityLas Vegas
Period16/12/2018/12/20

Keywords

  • Cryptography
  • Elliptic Curve Cryptography
  • Fuzzy logic
  • Internet-of-Things
  • Pseudo Random Sequences

Fingerprint

Dive into the research topics of 'Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication'. Together they form a unique fingerprint.

Cite this