Smart City Gnosys

Smart city article details

Title Secon-Ng: Implementing A Lightweight Cryptographic Library Based On Ecdh And Ecdsa For The Development Of Secure And Privacy-Preserving Protocols In Contiki-Ng
ID_Doc 47539
Authors Frimpong E.; Michalas A.
Year 2020
Published Proceedings of the ACM Symposium on Applied Computing
DOI http://dx.doi.org/10.1145/3341105.3374076
Abstract There is no doubt that the Internet of Things (IoT) has the power to change our world and drive us to a complete social evolution. In business and industry, there are thousands of IoT use cases and real-life IoT deployments across a variety of sectors (e.g. industry 4.0 and smart factories, smart cities, etc.). However, due to the vastly resource constrained nature of the devices used in IoT, implementing secure and privacy-preserving services, using for example standard asymmetric cryptographic algorithms, has been a real challenge. The majority of IoT devices on the market currently employ the use of various forms of symmetric cryptography such as key pre-distribution. The overall efficiency of such implementations correlate directly to the size of the IoT environment and the deployment method. In this paper, we implement a lightweight cryptographic library that can be used to secure communication protocols between multiple communicating nodes without the need for external trusted entities or a server. Our implementation is based on modifying the Elliptic-Curve Diffie-Hillman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA) components of the Tinycrypt cryptographic library. This work focuses on extending the functionalities of the User Datagram Protocol (UDP) broadcast application on the Contiki-NG Operating System (OS) platform. © 2020 Owner/Author.
Author Keywords Contiki-NG; Elliptic curve cryptography; Key distribution; Lightweight cryptography; Privacy; Wireless sensor networks


Similar Articles


Id Similarity Authors Title Published
4458 View0.883Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
35254 View0.881Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
29755 View0.875Mathews R.; Jose D.V.Hybrid Homomorphic-Asymmetric Lightweight Cryptosystem For Securing Smart Devices: A ReviewTransactions on Emerging Telecommunications Technologies, 35, 1 (2024)
35256 View0.874Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
9105 View0.871David V.; Ragu H.; Nikhil V.; Sasikumar P.Analysis Of Algorithms For Effective Cryptography For Enhancement Of Iot SecurityLecture Notes in Networks and Systems, 396 (2023)
35244 View0.869Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)
35248 View0.867Mishra S.; Mondal B.; Jha R.K.Lightweight Authentication Scheme Based On Ecc For IotSN Computer Science, 5, 7 (2024)
47465 View0.865Maqbool A.; Islam M.U.; Iqbal U.; Dar A.H.Scyther Validated Session Key Establishment In Iot2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019 (2019)
12571 View0.865Reddy D.J.; Sreshta G.; Vaishnavi J.V.; Sumasri V.Blockchain With Lightweight Encryption Model For Identity Management In Remote Health CareCognitive Science and Technology, 2025 (2025)
2150 View0.862Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)