Implementing ECC on Data Link Layer of the OSI Reference Model

09/25/2021
by   Donald Somiari Ene, et al.
0

The Internet, a rapidly expanding communication infrastructure, poses significant cybersecurity challenges. A few techniques have been developed to provide security in the OSI model's application, presentation, and network layers. Instead of using Media Access Control (MAC), this paper recommends using public key Elliptic Curve Cryptography to serve the Data Link Layer. On a microFourQ-MSP-IAR Embedded Workbench IDE-MSP430 7.12.4, a prototype of the architecture was implemented. When the cost of key generation was compared to the curve, it was shown that they are directly related. The cost of key generation time rises in proportion to the bit length of the curve. Because of the large number of connected devices that may be exposed due to a lack of effective security in the data link layer, significant concerns arise in terms of network privacy, governance, and security. As a result, this research suggests using a public key cryptosystem based on an elliptic curve to secure the data link layer for safe data communication in Internet-connected devices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/10/2019

Research on a Hybrid System With Perfect Forward Secrecy

The rapid development of computer technology will be the whole world as ...
research
09/28/2018

Efficient Construction of S-boxes Based on a Mordell Elliptic Curve Over a Finite Field

Elliptic curve cryptography (ECC) is used in many security systems due t...
research
03/25/2020

Parallel Computation of Optimal Ate Cryptographic Pairings at the 128, 192 and 256-bit security levels using elliptic net algorithm

Efficient computations of pairings with Miller Algorithm have recently r...
research
09/28/2022

Secure Indoor Location for Airport Environments

This work presents a secure novel solution based on inertial measurement...
research
06/16/2022

Securing Automotive Architectures with Named Data Networking

As in-vehicle communication becomes more complex, the automotive communi...
research
02/27/2019

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Public-key cryptography algorithms, especially elliptic curve cryptograp...
research
11/22/2021

Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

Several efforts have been seen claiming the lightweight block ciphers as...

Please sign up or login with your details

Forgot password? Click here to reset