Analysis of Using Elliptic Curve Cryptography in Authentication Systems in IoT

##plugins.themes.academic_pro.article.main##

Daniel Perdana Putra Purwiko
Favian Dewanta
Farah Afianti

Abstract

The Internet of Things is a complex system that is widely used in many ways to advance human life. As a result, Internet of Things (IoT) has many security vulnerabilities and requires an authentication system to protect user data. Selecting the authentication type that suits your needs is critical to achieving excellent performance on your Internet of Things (IoT) devices with relatively minimal specifications. Due to this situation, Elliptic Curve Cryptography (ECC) algorithm is one of the recommended algorithms which consumes less resources in the process. This study aims to test and compare the Fiat-Shamir based Elliptic Curve Cryptography (ECC) and Elliptic Curve Diffie-Hellman based  Hash Message Authentication Code (ECDH-HMAC) authentication algorithms. Parameters for this test are computation time, delay, program storage, and communication cost of the authentication algorithm. The experimental results show that the Elliptic Curve Diffie-Hellman based  Hash Message Authentication Code (ECDH-HMAC) algorithm has the lowest computational time, delay, and program storage usage, and the Fiat-Shamir based Elliptic Curve Cryptography (ECC) algorithm has the lowest communication cost value.

##plugins.themes.academic_pro.article.details##

How to Cite
Purwiko, D. P. P., Dewanta, F. ., & Afianti, F. . (2022). Analysis of Using Elliptic Curve Cryptography in Authentication Systems in IoT. MULTINETICS, 8(1), 42–49. https://doi.org/10.32722/multinetics.v8i1.4701

References

  1. Hasugian, B. S. (2017). Peranan Kriptografi Sebagai Keamanan Sistem Informasi Pada Usaha Kecil Dan Menengah.
  2. Hidayatullah, A., & Insanudin, E. (2016). Pengenalan Kriptografi dan Pemakaianya Sehari-Hari.
  3. “Symmetric and Asymmetric Encryption - Overview.” https://wizardforcel.gitbooks.io/practical-cryptography-for-developers-book (Diakses Juni 30, 2022).
  4. “Apa Itu Internet of Things.” https://www.dicoding.com/blog/apa-itu-internet-of-things/ (Diakses Juni 30, 2022).
  5. Damanik S Implementasi Algoritma Elliptic Curve Cryptography (ECC) Untuk Penyandian Pesan Pada Aplikasi Chatting Client Server Berbasis Desktop. JURIKOM. 2019; 6(4): 395-400.
  6. W. Raharjo and D. Sutanti, “Implementasi Zero Knowledge Proof Menggunakan Protokol Feige Fiat Shamir Untuk Verifikasi Tiket Rahasia”, Ultimatics : Jurnal Teknik Informatika, vol. 7, no. 2, pp. 91-97, Aug. 2016.
  7. R. K. Kodali and A. Naikoti, "ECDH based security model for IoT using ESP8266," 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016, pp. 629-633.
  8. Fredrik, J. D., Kusyanti, A., & Siregar, R. A. (2020). Implementasi Autentikasi pada Protokol CoAP menggunakan Feige-Fiat-Shamir Identification Scheme (Vol. 4, Issue 11).
  9. Maulana, L., Kusyanti, A., & Bakhtiar, F. A. (2019). Implementasi Metode Autentikasi dengan Zero Knowledge Proof menggunakan Protokol Feige-Fiat-Shamir Identification Scheme pada Perangkat Internet of Things (Vol. 3, Issue 9).
  10. Yang, Lu & Zhang, Quanling & Li, Jiguo. (2015). Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols. 159-162.
  11. “ECC vs RSA: Comparing SSL/TLS Algorithms.” https://cheapsslsecurity.com/p/ecc-vs-rsa-comparing-ssl-tls-algorithms/ (Diakses Juni 30, 2022).
  12. Dhafin Kawakibi, - (2019) Implementasi Algoritma Elliptic Curve Integrated Encryption Scheme Pada Perangkat Iot Untuk Keamanan Data Smart Home. S1 Thesis, Universitas Pendidikan Indonesia.
  13. D. P. Shah and P. G. Shah, "Revisting of elliptical curve cryptography for securing Internet of Things (IOT)," 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018, pp. 1-3.
  14. International Telecommunication Union Telecommunication Standarization Sector. G.1010. End-User Multimedia QoS. Switzerland Geneva: ITU; 2002.
  15. Anjali, Shikha, and M. Sharma, "Wireless sensor networks: Routing protocols and security issues," Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2014, pp. 1-5.