Elliptic curve cryptography based key management for the M2M local cloud platform

Bayu Anggorojati, Neeli Rashmi Prasad, Ramjee Prasad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for the M2M local cloud platform which consists of multiple gateways, which provides scalability to the distributed architecture of the platform while suitable for the low powered device. The scheme has been implemented as part of the M2M platform and its performance has been evaluated. The analysis of the evaluation results in terms of processing time to perform various operations will be discussed.

Original languageEnglish
Title of host publication2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages73-78
Number of pages6
ISBN (Electronic)9781509046294
DOIs
Publication statusPublished - 6 Mar 2017
Event8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016 - Malang, Indonesia
Duration: 15 Oct 201616 Oct 2016

Publication series

Name2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016

Conference

Conference8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
Country/TerritoryIndonesia
CityMalang
Period15/10/1616/10/16

Keywords

  • IoT
  • Key management
  • M2M
  • cloud
  • elliptic curve

Fingerprint

Dive into the research topics of 'Elliptic curve cryptography based key management for the M2M local cloud platform'. Together they form a unique fingerprint.

Cite this