Research Article

An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT

Table 2

Comparison of state-of-the-art IoT security solutions.

State of art solutionTraditional PKICertificateless PKIID-based PKI

Existing cloud-based solutions transferred huge amount of data directly to cloud that brings down the network performance severely and pose a single point of failureDigital certificate requires computation heavy process to build and validateIt avoids certain complex PKI operations. But it still uses partial key generation, revocation processKey escrow problem

These solutions added extra circuit to produce the PUFComputation intensive processComputation intensive processComputation intensive process

It requires more time to generate PUF mappingMemory consumption is highMemory consumption is highMemory consumption is high