Submitted:
13 June 2024
Posted:
18 June 2024
Read the latest preprint version here
Abstract
Keywords:
1. Introduction

2. A Novel Security System on the Internet of Things

3. Modified Elliptic Curve Cryptography Algorithm.

4. The Authority Device (AD)

4.1. The Authority Device Structure

5. The Node Device
5.1. The Node Structure

5.2. The Node Neighborhood

5.3. The Node Decommission

5.4. Multiple Nodes System

6. The System Reliability and Integrity
6.1. The System Reliability Features

6.2. The Authority Device, Decommission Unit

7. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Controlled Physical Random Function. Blaise Gassend, Dwaine Clarke, Marten van Dijk † and Srinivas Devadas. 13 Dec. 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp. 149-160.
- Goutsos, Konstantinos. Physical Unclonability Framework forthe Internet of Things. The UK - Newcastle : Newcastle University, 2019.
- KINZA SHAFIQUE, BILAL A. KHAWAJA, FARAH SABIR, SAMEER QAZI, MUHAMMAD MUSTAQIM. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. s.l. : IEEE Acess, 2020.
- Analysis of Encryption Algorithms Proposed for Data Security in 4G and 5G Generations. Khalid Fadhil Jasim 1*, Kayhan Zrar Ghafoor2,3, and Halgurd S. Maghdid. 2022. ITM Web of Conferences 42, 01004 (2022).
- Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications. Javed R. Shaikh, Maria Nenova, Georgi Iliev and Zlatka Valkova-Jarvis. Sofia, Bulgaria : s.n., 2017. IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS).
- Elliptic Curve Cryptosystems. Koblitz, Neal. 1987, MATHEMATICS OF COMPUTATION, Vol. 48, pp. 203-209.
- Constandinos, X. Mavromoustakis, Jordi Mongay Batalla, George Mastorakis. Internet of Things (IoT) in 5G Mobile Technologies. Switzerland : Springer International Publishing Switzerland, 2016.
- Lightweight and Secure PUF Key Storage Using Limits of Machine Learning. Meng-Day, Yu1, David M’Raihi, Richard Sowell,. 2011, International Association for Cryptologic Research, p. 16.
- Brown, Daniel R. L. SEC 1: Elliptic Curve Cryptography. s.l. : Standards for Efficient Cryptography, 2009.
- SEC 2 : Recommended Elliptic Curve Domain Parameters. s.l. : Standards for Efficient Cryptography, 2010.
- Buckley, Eoin. SEC 4 Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) - draft 2. s.l. : Standards for Efficient Cryptography, 2014.
- Silicon Physical Random Functions. Blaise Gassend, Dwaine Clarke, Marten vandijk, and Srinivas Devadas. November 2002. Proceedings of the 9th ACM conference on Computer and communications security.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).