Elliptic curve cryptography based key management for the M2M local cloud platform

Bayu Anggorojati, Neeli Rashmi Prasad, Ramjee Prasad

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

4 Citations (Scopus)

Abstract

Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for the M2M local cloud platform which consists of multiple gateways, which provides scalability to the distributed architecture of the platform while suitable for the low powered device. The scheme has been implemented as part of the M2M platform and its performance has been evaluated. The analysis of the evaluation results in terms of processing time to perform various operations will be discussed.

Original languageEnglish
Title of host publication2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
Number of pages6
PublisherIEEE
Publication date6 Mar 2017
Pages73-78
Article number7872754
ISBN (Electronic)978-1-5090-4629-4
DOIs
Publication statusPublished - 6 Mar 2017
Event8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016 - Malang, Indonesia
Duration: 15 Oct 201616 Oct 2016

Conference

Conference8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
Country/TerritoryIndonesia
CityMalang
Period15/10/201616/10/2016
SeriesInternational Conference on Advanced Computer Science and Information Systems (ICACSIS). Proceedings.

Keywords

  • cloud
  • elliptic curve
  • IoT
  • Key management
  • M2M

Fingerprint

Dive into the research topics of 'Elliptic curve cryptography based key management for the M2M local cloud platform'. Together they form a unique fingerprint.

Cite this