Reference Hub1
Securing Embedded Computing Systems through Elliptic Curve Cryptography

Securing Embedded Computing Systems through Elliptic Curve Cryptography

Elisavet Konstantinou, Panayotis E. Nastou, Yannis C. Stamatiou, Christos Zaroliagis
ISBN13: 9781466639225|ISBN10: 1466639229|EISBN13: 9781466639232
DOI: 10.4018/978-1-4666-3922-5.ch020
Cite Chapter Cite Chapter

MLA

Konstantinou, Elisavet, et al. "Securing Embedded Computing Systems through Elliptic Curve Cryptography." Embedded Computing Systems: Applications, Optimization, and Advanced Design, edited by Mohamed Khalgui, et al., IGI Global, 2013, pp. 402-419. https://doi.org/10.4018/978-1-4666-3922-5.ch020

APA

Konstantinou, E., Nastou, P. E., Stamatiou, Y. C., & Zaroliagis, C. (2013). Securing Embedded Computing Systems through Elliptic Curve Cryptography. In M. Khalgui, O. Mosbahi, & A. Valentini (Eds.), Embedded Computing Systems: Applications, Optimization, and Advanced Design (pp. 402-419). IGI Global. https://doi.org/10.4018/978-1-4666-3922-5.ch020

Chicago

Konstantinou, Elisavet, et al. "Securing Embedded Computing Systems through Elliptic Curve Cryptography." In Embedded Computing Systems: Applications, Optimization, and Advanced Design, edited by Mohamed Khalgui, Olfa Mosbahi, and Antonio Valentini, 402-419. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3922-5.ch020

Export Reference

Mendeley
Favorite

Abstract

Embedded computing devices dominate our everyday activities, from cell phones to wireless sensors that collect and process data for various applications. Although desktop and high-end server security seems to be under control by the use of current security technology, securing the low-end embedded computing systems is a difficult long-term problem. This is mainly due to the fact that the embedded systems are constrained by their operational environment and the limited resources they are equipped with. Recent research activities focus on the deployment of lightweight cryptographic algorithms and security protocols that are well suited to the limited resources of low-end embedded systems. Elliptic Curve Cryptography (ECC) offers an interesting alternative to the classical public key cryptography for embedded systems (e.g., RSA and ElGamal), since it uses smaller key sizes for achieving the same security level, thus making ECC an attractive and efficient alternative for deployment in embedded systems. In this chapter, the processing requirements and architectures for secure network access, communication functions, storage, and high availability of embedded devices are discussed. In addition, ECC-based state-of-the-art lightweight cryptographic primitives for the deployment of security protocols in embedded systems that fulfill the requirements are presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.