Skip to content
2000
Volume 13, Issue 5
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

Background: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern. Proposed Work: In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confidentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, desynchronization attack, impersonation attack, key-compromise attack, location tracking attack, denial of service attack, and man-in-the-middle attack. Results: Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes. Conclusion: The proposed protocol presented in this paper can be used as a building block in designing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/2213275912666190617161732
2020-10-01
2025-09-04
Loading full text...

Full text loading...

/content/journals/rascs/10.2174/2213275912666190617161732
Loading

  • Article Type:
    Research Article
Keyword(s): low computing power devices; RFID; Security; signcryption; smart card; WSN
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test