Visible to the public Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things

TitleFuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Publication TypeJournal Article
Year of Publication2022
AuthorsAbdaoui, Abderrazak, Erbad, Aiman, Al-Ali, Abdulla Khalid, Mohamed, Amr, Guizani, Mohsen
JournalIEEE Internet of Things Journal
Volume9
Pagination9987—9998
ISSN2327-4662
Keywordsauthentication, cryptography, Elliptic curve cryptography, Elliptic curve cryptography (ECC), Fuzzy Cryptography, Fuzzy logic, Internet of Things, Internet of Things (IoT), Metrics, Pollard’s ρ, Protocols, pseudorandom numbers, pubcrawl, resilience, Resiliency, Scalability, security
AbstractThe security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy, and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for IoT systems. In this article, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests, such as: frequency test, frequency test with mono block, run test, discrete Fourier transform (DFT) test, and advanced DFT test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms, such as Pollard's \textbackslashrho and Baby-step Giant-step, to evaluate the vulnerability of the proposed scheme.
DOI10.1109/JIOT.2021.3121350
Citation Keyabdaoui_fuzzy_2022