Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications22 (5):848-858,2017.Type:Article
Date Reviewed: Nov 29 2017

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest to readers who are familiar with message queue telemetry transport (MQTT) and advanced message queueing protocol (AMQP).

According to the authors, “existing security protocols such as SSL/TLS have a large overhead of computations, storage, and communications.” In providing security solutions, the researchers propose the use of ECC to decrease the performance overhead from fog network systems, scalable key exchange, and more efficient authentication and encryption systems. “ECC [is known for providing] shorter key lengths, reduced message sizes, and lower resource usages,” according to the paper.

The most interesting part is the researchers’ evaluation of “two alternative protocol design approaches using ECC for security key exchange and encryption mechanisms.” In the man-in-the-middle attack scenario, the researchers show that “mutual authentication between the subscriber/publisher and the fog broker [can be] achieved.”

The research keeps the tables simple and informative to show the differences in key sizes between ECC and RSA, and in the performance between the researchers’ two schemes and SSL/TLS. As part of the researchers’ future study, they plan “to implement the protocol on real IoT platforms.”

Reviewer:  J. Myerson Review #: CR145681 (1802-0075)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Elliptic Equations (G.1.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy