How to Cite?
Narmatha.K, Sujay.S, Arjitvijey. J, "Internet of Things Security By Elliptic Curve Cryptography," International Journal of Computer Trends and Technology, vol. 68, no. 6, pp. 37-40, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I6P106
Abstract
One of the trendy expressions in the Information Technology is Internet of Things (IoT). What`s to come is Internet of Things, which will change this present reality objects into savvy virtual items. The same number of assets are being shared through web, security turns into a fundamental element in current trend. This paper depicts in insight concerning the different security strategies that can be connected to web of things .Elliptic Curve Cryptography is one of the techniques in access booting that can effectively encode/decode the information by the utilization of advanced marks. Key age fills in as a vital part in Elliptic Curve Cryptography, as both open and private key should be produced. This technique guarantees to give an effective protection and security when contrasted and different calculations utilized in cryptography
Keywords
IoT, Security, Access booting, Elliptic Curve Cryptography, Key
Reference
[1] Dodson, S. (2008) "The Net Shapes upto Get Physical. Guardian." Gershenfeld, N., Krikorian, R. and Cohen, The Internet of Things.
[2] Mohsenb Bafandehkar, Sharifah MD Yasin, Ramlan Mahmod Zurina Mohd Hanapi, "Comparison of ECC and RSA Algorithm in Resource Constraint Devices, Proceedings of the International Conference on IT Convergence and Security (ICITCS)",.
[3] Arun Pratap Singh, Himanshu Pundir, "Secure File Storage On Cloud Using Cryptography", SSRG International Journal of Computer Science and Engineering, Volume 7 Issue 5 – 2020.
[4] Sandeep S. Kumar, "Elliptc Curve Cryptography for Constrained Devices", PhD Thesis, Ruhur University Bochum, 2006.
[5] Ankita Soni and Nisheeth Saxena "Elliptic Curve Cryptography; An Efficient Approach for Encryption and Decryption of a Data Sequence", International Journal of Science and Research (IJSR).
[6] N. Koblitz, "Elliptic Curve Cryptosyaytems Mathematics of Computation, V.S. Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology".
[7] B. Akhil, Md Muzammil Shareef, B. Shalini ,Dr.SK.Fairooz , Shaik Mohammed Rafi, “Light weight security coding using PRESENT algorithm for cryptography application”, SSRG International Journal of VLSI & Signal Processing, - Volume 7 Issue 2 – 2020.