Performance evaluation of IoT encryption algorithms: memory, timing, and energy
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
[HTML][HTML] Rapidly deployable IoT architecture with data security: Implementation and experimental evaluation
S Maitra, K Yelamarthi - Sensors, 2019 - mdpi.com
Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing
and integration of heterogeneous objects connected to the network. The broad nature of its …
and integration of heterogeneous objects connected to the network. The broad nature of its …
Analyzing the resource utilization of AES encryption on IoT devices
PS Munoz, N Tran, B Craig… - 2018 Asia-Pacific …, 2018 - ieeexplore.ieee.org
With the prosperity of the Internet of Things (IoT), the implied security issues demand
heightened attention. However, conventional cryptographic security solutions often lead to …
heightened attention. However, conventional cryptographic security solutions often lead to …
Low-cost AES-128 implementation for edge devices in IoT applications
S Shanthi Rekha, P Saravanan - Journal of Circuits, Systems and …, 2019 - World Scientific
Internet of Things (IoT) is an ecosystem of connected edge devices that are accessible
through the internet. Recent research focusses on adding more smartness and intelligence …
through the internet. Recent research focusses on adding more smartness and intelligence …
SIT: a lightweight encryption algorithm for secure internet of things
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …
connect billions of devices. The increased number of communication is expected to …
An efficient lightweight cryptographic algorithm for IoT security
To perform various tasks, different devices are interconnected and interact in several
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …
MAES: Modified advanced encryption standard for resource constraint environments
AR Chowdhury, J Mahmud… - 2018 IEEE Sensors …, 2018 - ieeexplore.ieee.org
Internet of things (IoT), internetworking of smart devices, embedded with sensors, software,
electronics and network connectivity that enables to communicate with each other to …
electronics and network connectivity that enables to communicate with each other to …
Efficient security algorithm for power-constrained IoT devices
JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques due to their constrained …
do not exactly fit into the provision of existing security techniques due to their constrained …
[HTML][HTML] Power consumption and calculation requirement analysis of AES for WSN IoT
CW Hung, WT Hsu - Sensors, 2018 - mdpi.com
Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and
security of IoT systems have become very important issues. Advanced Encryption Standard …
security of IoT systems have become very important issues. Advanced Encryption Standard …
End-to-end encryption in resource-constrained IoT device
ASD Alluhaidan, P Prabu - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …
regardless of their local network and resource capacities. Ensuring the security …