Article | Protocol | Curve | Hardware | Achievement | Weakness |
---|---|---|---|---|---|
Liu and Ning (2008) | ECDSA, ECIES | SECG Curves | ATmega - @ 16 MHz | Low security levels (80–96 bits) | limited for small MTCDs |
Düll et al. (2015) | ECDH | Curve25519 | ARM Cortex M0 @ 48 MHz | Robustness Cost effective | Consume 2x computation due to heavy curve |
De Clercq et al. (2014) | ECDLP | Mixed curves | MSP430X ARM Cortex | Resource constrained device afforded computation | Side channel attacks horizontal attacks |
Liu et al. (2015) | ECDSA, ECDH | NIST P-192 | ATmega328P @ 16 MHz | Resource constrained device afforded computation | Ineffective security, Side channel Threat |
Fujii and Aranha (2018) | ECqDSA | Curve25519 | ARM Cortex-M4 @ 48 MHz | Up to 50% optimized Operations | Inefficient implementation technique |
Devi et al. (2015) | ECDH | NIST P-256 | 3GPP | Low execution requirements | Database related threats and optimization |
Moosavi et al. (2018b) | ECDH | ECG based IPI-PRNG | WLAN Configuration | Large prime random curve points | Secure authorization and effective authentication of all devices |
De Santis and Sigl (2016) | ECqDSA | X25519 | ARM Cortex M4 @ 48 MHz | Efficient DSA | Heavy Curves and computation cost |
Oliveira et al. (2017) | ECqDSA | Ed25519 | Teensy 3.1 @ 48 MHz | Improved DSA computation | Heavy point arithmetic |
Fujii and Aranha (2018) | ECqDSA | Ed25519 | ARM Cortex M4 @ 48–72 MHz | Efficient Key generation | Heavy curve and multi point arithmetic |
This Work | ECDH / LPRN | Curve25519 | ATmega2560 @ 16 MHz | Strong curve & extremely low memory and exec. cost | Performance efficiency depends on Secret key’s size |