Performance analysis of Signcryption and Sign-then-Encrypt schemes for resource-constrained IoT devices

Mohammed El-hajj

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

More and more devices are being connected to the Internet as a result of the Internet of Things’ (IoT) rapid expan- sion. Most of these devices are considered resource-constrained devices with limited CPU, memory, and power resources. On the other hand, protecting all of these devices from potential cyberattacks is equally essential. For such devices, the traditional cryptographic schemes are often too heavy. Therefore, signcryp- tion was invented. Signcryption performs signing and encryption at the same time and is theoretically more efficient compared to traditional schemes. However, to our knowledge, no work has been done comparing the performance of signcryption schemes with traditional cryptographic schemes in a practical manner. This research will implement multiple signcryption and tradi- tional cryptographic schemes on a resource-constrained device and measure computational costs, power draw & communication overhead. These measurements will be analysed and used to create a comprehensive comparison. The research will add to the scientific body of knowledge of comparisons between signcryption and traditional cryptographic schemes.
Original languageEnglish
Title of host publicationProceedings of the Interdisciplinary Conference on Mechanics, Computers and Electrics (ICMECE 2022)
Publication statusPublished - 6 Oct 2022
EventInterdisciplinary Conference on Mechanics, Computers and Electrics, ICMECE 2022 - Barcelona, Spain
Duration: 6 Oct 20227 Oct 2022

Conference

ConferenceInterdisciplinary Conference on Mechanics, Computers and Electrics, ICMECE 2022
Abbreviated titleICMECE 2022
Country/TerritorySpain
CityBarcelona
Period6/10/227/10/22

Fingerprint

Dive into the research topics of 'Performance analysis of Signcryption and Sign-then-Encrypt schemes for resource-constrained IoT devices'. Together they form a unique fingerprint.

Cite this