{"title":"智能网络的集群安全性","authors":"Swati V, T. P. Rani","doi":"10.1109/ICCCT2.2017.7972301","DOIUrl":null,"url":null,"abstract":"The heterogeneous Internet of things bridges together multiple devices with different capabilities, functionalities, configurations, platforms, varieties and multiple users with different roles advocating its ubiquity and thereby, exposing the security risks faced by devices and users. Security is paramount for the safe, reliable operations of IoT connected devices and it is the foundational enabler for IoT. The cryptographic mechanisms are one of the means to provide security. The cryptographic schemes must be strong enough to meet the security requirements but, at the same time, they must meet the limitations in the resource constrained networks. This project focuses on efficient message deliveries among resource-constrained devices in IoT using the ElGamal Signature Scheme to enable the protection of user data. ElGamal signature scheme make use of (i) complexity in computing discrete logarithms, (ii) secure end-to-end communication based on session resumption and (iii) proves its power by use of random number generation. The proposed model employs data encryption rather than key exchanges in order to avoid overhead in sending large number of packets between energy-constrained sensors.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Clustered security for Smart Networks\",\"authors\":\"Swati V, T. P. Rani\",\"doi\":\"10.1109/ICCCT2.2017.7972301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The heterogeneous Internet of things bridges together multiple devices with different capabilities, functionalities, configurations, platforms, varieties and multiple users with different roles advocating its ubiquity and thereby, exposing the security risks faced by devices and users. Security is paramount for the safe, reliable operations of IoT connected devices and it is the foundational enabler for IoT. The cryptographic mechanisms are one of the means to provide security. The cryptographic schemes must be strong enough to meet the security requirements but, at the same time, they must meet the limitations in the resource constrained networks. This project focuses on efficient message deliveries among resource-constrained devices in IoT using the ElGamal Signature Scheme to enable the protection of user data. ElGamal signature scheme make use of (i) complexity in computing discrete logarithms, (ii) secure end-to-end communication based on session resumption and (iii) proves its power by use of random number generation. The proposed model employs data encryption rather than key exchanges in order to avoid overhead in sending large number of packets between energy-constrained sensors.\",\"PeriodicalId\":445567,\"journal\":{\"name\":\"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT2.2017.7972301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2017.7972301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The heterogeneous Internet of things bridges together multiple devices with different capabilities, functionalities, configurations, platforms, varieties and multiple users with different roles advocating its ubiquity and thereby, exposing the security risks faced by devices and users. Security is paramount for the safe, reliable operations of IoT connected devices and it is the foundational enabler for IoT. The cryptographic mechanisms are one of the means to provide security. The cryptographic schemes must be strong enough to meet the security requirements but, at the same time, they must meet the limitations in the resource constrained networks. This project focuses on efficient message deliveries among resource-constrained devices in IoT using the ElGamal Signature Scheme to enable the protection of user data. ElGamal signature scheme make use of (i) complexity in computing discrete logarithms, (ii) secure end-to-end communication based on session resumption and (iii) proves its power by use of random number generation. The proposed model employs data encryption rather than key exchanges in order to avoid overhead in sending large number of packets between energy-constrained sensors.