Loading

The Implementation Results of Identity-Based Hashing Algorithm for Iot
Rafidha Rehiman K A1, S Veni2

1Rafidha Rehiman K A, department of Computer Science, Karpagam Academy of Higher Education Coiambathore.
2Dr. S Veni, department of Computer Science Karpagam Academy of Higher Education Coiambathore.
Manuscript received on 26 August 2019. | Revised Manuscript received on 06 September 2019. | Manuscript published on 30 September 2019. | PP: 4249-4252 | Volume-8 Issue-11, September 2019. | Retrieval Number: K24160981119/2019©BEIESP | DOI: 10.35940/ijitee.K2416.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nonrepudiation in Mobile environment is a major challenge in the area of IoT security. Public-key-based Digital Signature schemes are common and their computational requirements and complexities do not support constrained devices. This paper presents the design and implementation results of light weight nonrepudiation architecture based on public key cryptography and Elliptic Curve addition to reduce the overhead of processing and communication.
Keywords: Nonrepudiation, Digital Signature, IoT Security, ECC cryptosystem, Hashing
Scope of the Article: IoT