Elliptic Curve Cryptography Based Security Framework For Internet of Things (Iot) Enabled Smart Card
Elliptic Curve Cryptography Based Security Framework For Internet of Things (Iot) Enabled Smart Card
net/publication/320651892
CITATIONS READS
6 124
3 authors:
S. Albert Rabara
St. Joseph's College of Tiruchchirappalli
52 PUBLICATIONS 222 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Michael Raj K on 02 October 2018.
Abstract—Smart cards are adopted by people worldwide for domains. The various security requirements are mutual
different applications and they are only intra domain oriented authentication, confidentiality, integrity and non-
due to security concerns. The literature study reveals that repudiation. To enhance the security requirements of the IoT
research has been carried out all over the world to strengthen enabled Smart Card, Elliptic Curve Cryptography (ECC) is
the security requirements of the smart cards. But there is no adopted, recommended by NIST [6].
research proposal to report that one smart card to support all Elliptic curve cryptography is like RSA public key
application domains invariably. Hence, in this paper a novel cryptography. The security strength of ECC depends on the
Elliptic Curve Cryptography (ECC) based security framework
difficulty of Elliptic Curve Discrete Logarithm Problem
for Internet of Things (IoT) enabled Smart Card is proposed.
(ECDLP) [7]. ECC adopts scalar multiplication, which
This is a secured and novel one for the public to access
diversified smart applications with one Smart Card at
includes point doubling and adding operation which is
anywhere and anytime. The security analysis ensures that ECC computationally more efficient than RSA exponentiation.
provides strong security for Smart Card implementation. The complexity of ECC puts the attacker in difficulty to
understand the ECC and to break the security key. The
Keywords-internet of things; elliptic curve cryptography; security level given by RSA with 1024 bit key can be
security; integrity; confidentiality; smart card achieved with 160 bit key by ECC. It is well suited for
resource constraint devices like smart cards, mobile devices,
I. INTRODUCTION etc. [8]. Hence in this paper Elliptic Curve Cryptography
based security framework for IoT enabled Smart Card is
People around the world use Smart Cards for different proposed.
applications such as mobile communications, banking and This paper is organized as follows. Section II describes
financial services, passport, identity cards, transportation, the proposed work. Section III presents security analysis
health care services, education, remote working, etc [1]. and Section IV concludes the paper.
Different types of smart cards in use today are contact,
contactless, dual interface and hybrid cards. Contact Cards II. ELLIPTIC CURVE CRYPTOGRAPHY BASED SECURITY
are widely used for many applications currently. Contactless FRAMEWORK
Smart Card is a general purpose Internet of Things (IoT) The proposed ECC based security framework for IoT
enabled application device. enabled smart card involves ECC based encryption and
Internet of things is not a single technology, it is the decryption and digital signature creation and verification.
concept in which many of the new things are getting This section also briefs the IoT enabled smart card
networked and connected anytime, anyplace, with anything deployment environment where ECC is incorporated. The
and anyone ideally using any path or network and any various scenarios are as follows:
service in a heterogeneous environment [2].
European Research Cluster on the Internet of Things A. IoT enabled Smart Card
(IERC) states that “Internet of Things is a dynamic global IoT enabled Smart Card is designed as per the ISO/IEC
network infrastructure with self-configuring capabilities 14443/7816 standard [9]. This IoT enabled smart card is
based on standard and interoperable communication referred as User Adoptable Intelligent Smart Card (UAISC).
protocols where physical and virtual things have identities, It adopts Elliptic Curve Cryptography and facilitates to avail
physical attributes and virtual personalities and use secure smart services and applications distributed in cloud
intelligent interface and are seamlessly integrated into the environment and perform transactions anywhere, anytime in
information network”[3]. In a nutshell, IoT is characterized a smart environment over the Global Secure Management
by the real world of smart objects with limited storage and System (GSMS) with one twenty digit Unique Identification
processing power [4]. (UID) number per citizen with an end to end security
In this regard the research reveals that Contactless IoT through the IoT enabled intelligent systems [10]. The
enabled Smart Cards are very few in their design and still in scenario where UAISC is deployed in smart environment is
the infancy stage [5]. Security is one of the major concerns in presented in Fig.1.
implementing IoT enabled Smart Card to all application
44
When T S, d will be incremented up to (p+1)/2
The points on the curve is (x,y1), (x,y2). When the points
are generated for the defined Elliptic Curve, the generator
point ‘G’ and ‘N’ which is the next largest prime for ‘p’ are
chosen. For the defined Elliptic Curve the chosen N is 979
and the generator point is (17,427). When N is multiplied by
the point generator ‘G’ it produces zero and is capable of
reproducing all the points generated with the defined curve.
The generated points over the proposed Elliptic Curve (Ep
(a, b)) are given in Fig. 2.
From the generated points, eighty points are randomly
chosen for character assignment and those points are used to
carry out the message encryption and decryption. The sample Fig. 2. Generated Points
assignment is given in Table 1. Then plain text (M) is
encoded into a point P(M) from the finite set of points a = (-3), b=3, Y2 = (-3)3+1 (mod 997)
generated in the elliptic curve Ep (a, b). When the points are G = (17,427), r = Random Number = 7
generated, selecting a generator point ‘G’ is the important Pr = Private Key = 11, Pu = Public Key = (706, 620)
factor, where G אEp (a, b). The generator point and the Cipher Text (CT)
Ep(a, b) will be made public. In the proposed model, the CT= (r*G), T+ r*(G.Pr)
generator point is (17, 427). Sender and Receiver can select a = (542, 665), (960,832) = D, 2
private key (Pr) and calculate the public key Pu = Pr*G. The Cipher text for ‘Q” is ‘D’, ‘2’
simple method of ECC based encryption and decryption is The reverse process is adopted to decrypt the plain
given below. text.1st point of the cipher text is multiplied by the private
key i.e (‘a’ * ‘pr’). This answer will be added with the
TABLE I. CHARACTER ASSIGNMENT TO THE ELLIPTIC
CURVE POINTS inverse of the 2nd point. Hence, Plain Text (PT) is as
follows:
PT = b - (‘a’ * ‘pr’)
‘a’ * ‘pr’ = (542,665)*11 = (482,299)
b – (‘a’ * ‘pr’) = (960,832) – (482,299)
Adding the inverse we get
PT = (960,832) + (482,299) = (4,433) = ‘Q’
To do this cryptography point addition, point doubling
and point multiplication are employed. To make encryption
and decryption more feasible both sender and the receiver
should know and agree upon the table defined with the
chosen Elliptic Curve. It is rather difficult for any attacker to
break or hack the information during transaction since it
adopts Elliptic Curve Cryptography.
C. Mutual Authentication
To encrypt the message random integer ‘r’ is chosen. ‘r’ To initiate any communication IoT enabled Smart Card
is multiplied with the generator point ‘G’ which is the first should be mutually authenticated with the Intelligent Smart
point and then public key of the receiver is multiplied with Reader (ISR) to ensure its identity and authenticity. This
‘r’ and with the plain text which is the second point. Hence process involves ECC based encryption and decryption and
the encrypted message CT is [(r.G), (M+r. Pu)]. To decrypt digital signature creation and verification. This is depicted in
the message, multiply the first point of the ciphertext pair Fig.3. After mutual authentication, the authenticated
(r.G) with the private key (Pr). Add this result to the second messages are transmitted in an encrypted form for effective
point of the ciphertext pair. Hence the decrypted message PT and secure communication. It prevents an adversary to
is (M+r.Pu)-(Pr(r.G))=(M+r.PrG) - (Pr(r.G)). perform malicious activities and enhances confidentiality.
To do this cryptography point addition, point doubling
and point multiplication are employed. To make encryption III. SECURITY ANALYSIS
and decryption more feasible both sender and the receiver The Security Framework for UAISC involves mutual
should know and agree upon the table defined with the authentication and UAISC authentication. During mutual
chosen Elliptic Curve. It is rather difficult for any attacker to authentication, the communicating devices UAISC and the
break or hack the information during transaction since it Card Reader authenticate mutually to ensure that the UAISC
adopts Elliptic Curve Cryptography. The example for is an authenticated one. Since the information stored on the
encryption and decryption using ECC is presented. card encrypted and digitally signed using ECC privacy and
Pain text taken is “Q” = (4,433) integrity are achieved.
Y2 = X3-aX+b (mod 997)
45
The values given in Table 2 and Fig. 4 prove that ECC
can provide same security level of RSA with shorter key
length and cost effectiveness. The advantage of ECC over
RSA is very obvious.
IV. CONCLUSION
The proposed Elliptic Curve Cryptography based
Security framework for IoT enabled smart card is a unique
one to avail any applications and any services anywhere,
anytime with an end to end security. Implementing this
security framework will help every citizen to have secure
access for any applications with one IoT enabled smart card
in a smart environment. This IoT enabled smart card can
connect people and enable secure automatic machine to
Fig. 3. Mutual Authentication machine communication. The message encryption and the
authentication ensure unique authentication, integrity,
confidentiality and privacy of the information and smart
A. Comparison of Public Key Cryptosystems card. The security analysis presented proves the efficiency of
The comparison of public key cryptosystems has been the Elliptic Curve Cryptography to be implemented for IoT
carried out with bouncy castle package. The performance of enabled Smart Card.
ECC depends on the efficient computation of scalar
multiplication. ECC can use small size key and offer the REFERENCES
same level of security as the other public key cryptographic [1] R.N.Akram and K.Markantonakis, “Smart Cards: State-of-the-Art to
algorithms do with large size keys. Table 2 presents the key Future Directions”, IEEE,pp. 154-162, 2013.
size ratio and cost ratio of ECC and RSA. Fig. 4 presents the [2] Gubbi, J., Buyya, R., Palaniswami, M., Marusic, S., “Internet of
Things (IoT): A Vision, Architectural Elements, and Future
results of the comparative study made between ECC and Directions”. Future Generation Computer Systems, Vol.29, pp. 1645-
RSA. 1660, 2013.
[3] Vermesan, O., Friess, P., “Internet of Things: Converging
TABLE II. KEY SIZE AND COST SIZE RATIO OF ECC AND RSA Technologies for Smart Environments and Integrated Ecosystems”.
River Publishers Series in Communications, Aalborg, 2013.
ECC Key RSA Key Key Size Cost
[4] Roman, R., Najera, P., Lopez, J., “Securing the Internet of Things”.
Size (bits) Size(bits) Ratio Ratio IEEE Computer, Vol.44, pp. 51-58, 2011,
160 1024 1:7 1:3 [5] K.Mayes and K. Markantonakis, “An Introduction to Smart Cards and
Rfids”, Secure Smart Embedded Devices, Platforms and
224 2048 1:10 1:6 Applications, pp. 3-25, Springer Science, 2014.
256 3072 1:12 1:10 [6] M.Amara and A.Siad, “Elliptic Curve Cryptography and its
Applications”, 7th International Workshop on Systems, Signal
384 7680 1:20 1:32 Processing and their Applications (WOSSPA), pp. 247-250, IEEE,
521 15360 1:30 1:64 2011.
[7] Moncef, A., Amar, S., “Elliptic Curve Cryptography and its
Applications”, Proceedings IEEE International Workshop on
Systems, Signal Processing and their Applications (WOSSPA), 9th-
11th May, Algeria. Pp. 247-250, 2011.
[8] Sandeep, S.K., “Elliptc Curve Cryptography for Constrained
Devices”, Ph.D Thesis, Ruhur University Bochum, 2006.
[9] Daisy Premila Bai T, Albert Rabara S, Vimal Jerald M, “An
Adaptable Secure Smart Card Architecture for Internet of Things and
Cloud Computing”, IJRET, Vol. 5, pp. 162-170, 2016.
[10] Daisy Premila Bai T, Albert Rabara S, “Design and Development of
Integrated, Secured and Intelligent Architecture for Internet of Things
and Cloud Computing”, International Conference on Future Internet
of Things and Cloud, IEEE Computer Society, pp. 817-822, IEEE,
Fig. 4. ECC Vs RSA Comparison 2015.
46