An Overview on Security Schemes Based on Elliptic Curve for Cloud-Iot
The Internet of things appears as a solution in order to connect people around the world. With this concept of interconnection, sharing and dissemination of information between different physical objects. Many objects and services in different fields will be created, such as smart homes, e-health, transport and logistics that will make our everyday needs easier. The main characteristic of a connected object is that it must be identifiable, using technologies such as RFID (Radio-Frequency Identification), must interact with the environment by adding sensory techniques, and finally a connected object must be able to communicate with others. The evolution of Internet of things, increase the number of connected objects. Devices with sensors, generate a huge number of data. With this evolution, the big questions come! how can we control this big data? Cloud Computing a notion that is not newer than the IoT concept, but it's a revolution has steadily been gaining ground. It's a technology that offers to end users a great services in terms of storage, elasticity, analyzing data and other services . In this paper, we cite the benefits of integrating Cloud Computing and Internet of things to manage data provided by physical object and security difficulties that may have this convergence. We also present an overview of the security algorithms proposed in the literature, based on elliptic curves, in order to secure communication between smart objects and cloud computing.
Alessio Botta, Walter De Donato, Valerio Persico, and Antonio Pescapé. On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on, pages 23-30. IEEE,2014
Stefan Nastic, Sanjin Sehic, Duc-Hung Le, Hong-Linh Truong, and Schahram Dustdar. Provisioning Software-Defined IoT Cloud Systems. pages 288-295. IEEE, August 2014.
Mohammad Aazam, Imran Khan, Aymen Abdullah Alsaffar, and Eui-Nam Huh. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. In Applied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on, pages 414-419. IEEE, 2014.
Arslan Munir, Prasanna Kansakar, and Samee U. Khan. IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine, 6(3):74–82, July 2017.
Manuel Díaz, Cristian Martín, and Bartolomé Rubio. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. Journal of Network and Computer Applications, 67: 99-117, May 2016.
Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
Jen-Ho Yang and Chin-Chen Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(3-4):138–143, May 2009.
Xiaojian Tian, D.S. Wong, and R.W. Zhu. Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications Letters, 9 (11):970-972: November 2005.]
Ding Wang, Ying Mei, Chunguang Ma, and Zhen-shan Cui. Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing. In WISM, pages 246–253. Springer, 2012.
Sk Hafizul Islam and G. P. Biswas. An improved ID-based client authentication with key agreement scheme on ECC for mobile client-server environments. Theoretical and Applied Informatics, 24(4), January 2012.
Jorge Granjal, Edmundo Monteiro, and Jorge Sa Silva. End-to-end transport layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In IFIP Networking Conference, 2013, pages 1-9. IEEE, 2013.
Sangram Ray and G P. Biswas. Establishment of ECC-based Initial Secrecy Usable for IKE Implementation. July 2012.
Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, and Hong Wang. EAPBased Group Authentication and Key Agreement Protocol for Machine-Type Communications. International Journal of Distributed Sensor Networks, 9(11):304601, November 2013.
Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. Procedia Computer Science, 32:198–206, 2014.
Sheetal Kalra and Sandeep K. Sood. Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24:210–223, December 2015.
Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, April 2017.
Chyi-Ren Dow, Syuan Cheng, and Shiow-Fen Hwang. A MQTT-based guide and notification service system. In Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016 IEEE _th Annual, pages 1–4. IEEE, 2016.
Heather Kreger and Jeff Estefan. Navigating the soa open standards landscape around architecture. Joint Paper, The Open Group, OASIS, and OMG, 2009 .
Leonard Kleinrock. Queueing systems. Wiley, New York, 1975.
Copyright (c) 2018 JOURNAL OF ADVANCES IN NATURAL SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited..