Elliptic Curve Cryptography For Constrained Devices In Internet Of Things And Industry 40
MetadataShow full item record
The article summarizes the usability of devices (which are usually equipped with AVR and ARM Cortex-M microcontrollers) with low-power consumption in security solutions for IoT and Industrial 4.0 ecosystems. These devices have limited processing and storage capabilities and they often run on batteries. On the other hand, cryptographic algorithms are usually computationally demanding and, therefore, it is hard to implement them on constrained devices. This work studies the capabilities of current IoT devices to perform elliptic curve cryptographic protocols and the possibilities to design and implement own cryptographic protocols on constrained devices.
Document typePeer reviewed
Document versionFinal PDF
SourceProceedings II of the 26st Conference STUDENT EEICT 2020: Selected Papers. s. 48-51. ISBN 978-80-214-5868-0
- Student EEICT 2020