Internet of things (iot) security

S Kulkarni, S Durg, N Iyer - 2016 3rd International Conference …, 2016 - ieeexplore.ieee.org
things located at any part of the world via Internet. So, IoT involves data security ie Cryptography
Here, in this paper we discuss how data can be made secure for IoT using Cryptography

[PDF][PDF] Internet of things: IETF protocols, algorithms and applications

MS Kumar, KJ Prakash - Int. J. Innov. Technol. Explor. Eng, 2019 - researchgate.net
… for decryption, Eg RSA algorithm. In this work for the data encryption they used two main
algorithms ie AES and RSA algorithms. AES is a symmetric key cryptography to use same keys …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
… whether their cryptographic algorithms suit IoT network traits and features. Cryptography is
the most effective method of data security [29,30]. It is critical to use cryptographic methods for …

Lightweight cryptography for the Internet of Things

A Hassan - Proceedings of the Future Technologies Conference …, 2021 - Springer
… the lightweight cryptographic algorithms area for IoT … cryptographic algorithms proposed
by various researchers. According to this survey, we recommended two lightweight algorithms

Security in the internet of things: a review

H Suo, J Wan, C Zou, J Liu - 2012 international conference on …, 2012 - ieeexplore.ieee.org
cryptographic algorithm and lightweight cryptographic protocol. At the same time the integrity
and authenticity of sensor data is becoming research focus, we will discuss this question …

Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment

M Jammula, VM Vakamulla… - Journal of Interconnection …, 2022 - World Scientific
cryptography algorithms to maintain. Further, it is necessary to identify the suitable cryptography
… Therefore, this article aims to introduce the detailed survey on various cryptographic

Securing the future internet of things with post‐quantum cryptography

A Kumar, C Ottaviani, SS Gill, R Buyya - Security and Privacy, 2022 - Wiley Online Library
… will be capable of resisting quantum algorithms or attacks. Thus, … algorithms require much
larger key sizes. Thus, integration of IoT networks with post-quantum cryptography algorithms

[HTML][HTML] Analysis of the Cryptographic Algorithms in IoT Communications

C Silva, VA Cunha, JP Barraca, RL Aguiar - Information Systems Frontiers, 2023 - Springer
cryptographic algorithms. Trying to evaluate the performance impact of those algorithms in …
paper we tested the impact of different cryptographic algorithms in low computational devices, …

Algorithmic method of security of the Internet of Things based on steganographic coding

A Kabulov, I Saymanov, I Yarashov… - … IOT, Electronics and …, 2021 - ieeexplore.ieee.org
In the Internet of Things, it is more important than ever to effectively address the problem of
secure transmission based on steganographic substitution by synthesizing digital sensor data…

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
… discovered by the third party, the encryption algorithms and cryptographic methods can be
used [89]. … In this situation, the hash functions or cryptography algorithm are recommended. …