Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

JJ Puthiyidam, S Joseph, B Bhushan - The Journal of Supercomputing, 2024 - Springer
Advancements in computing and communication technology have increased the number of
devices connected to the Internet, leading to the emergence of the Internet of Things (IoT) …

A Study of Elliptic Curve Cryptography and Its Applications

U Vijay Nikhil, Z Stamenkovic… - International Journal of …, 2024 - World Scientific
This paper aims to provide a comprehensive review on Elliptic Curve Cryptography (ECC), a
public key cryptographic system and its applications. The paper discusses important …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system

S Khan, Z Jiangbin, F Ullah, MP Akhter, S Khan… - PeerJ Computer …, 2024 - peerj.com
In the distributed computing era, cloud computing has completely changed organizational
operations by facilitating simple access to resources. However, the rapid development of the …

[PDF][PDF] The comparison of several cryptosystems using the elliptic curve: a report

MM Trung, DTT Le Phe Do, TT Trieu… - International Journal of …, 2024 - academia.edu
The elliptic curve cryptosystem (ECC) has several applications in Information Security,
especially in cryptography with two main activities including encrypting and decrypting …

Novel Hybrid Post-Quantum Encryption Design on Embedded Devices

I Cherkaoui, O Ali, J Horgan - 2024 IEEE 29th International …, 2024 - ieeexplore.ieee.org
Given the sudden rise of the emerging post-quantum encryption field, this comprehensive
study has a purpose of delving into the intricate realm of network protocols, focusing in depth …

Energy Consumption Analysis of Elliptic Curve Cryptography Middleware Broker for MQTT Application in IoT Systems

ZYM Yusoff, MK Ishak, LAB Rahim… - … Arab Conference on …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an expansion of connected smart devices from
small sensors to complex fog and cloud nodes and various network technologies and …

MMQP: A Lightweight, Secure and Scalable IoT Communication Protocol

F Pouhela, SP Sanon, D Krummacker… - … on Internet of Things …, 2024 - ieeexplore.ieee.org
The ever-evolving Internet of Things (IoT) landscape necessitates continuous advancements
in communication protocols to meet evolving requirements. In response, this paper …

Lightweight and robust MQTT protocol authentication model suitable for connected portals

E Toé, DF Somé, T Yélémou - 2023 IEEE Multi-conference on …, 2023 - ieeexplore.ieee.org
One of the most used protocols in smart homes is the MQTT protocol. This protocol was
developed to answer the issues of limited resources of connected objects by enabling data …

RANCANG BANGUN AUTOMATIC WATERING DAN MONITORING PADA TANAMAN CABAI MENGGUNAKAN PROTOKOL MQTT BERBASIS TEKNOLOGI …

A Alfian Muhammad Ibrahim - 2023 - repository.pnj.ac.id
Dengan Banyaknya Kejahatan Cyber seperti Distributed Denial of Service (DDoS) Attack
dengan membanjiri ip address jaringan target dengan request sehingga Sistem menjadi …