Internet of things (iot) security
S Kulkarni, S Durg, N Iyer - 2016 3rd International Conference …, 2016 - ieeexplore.ieee.org
… things located at any part of the world via Internet. So, IoT involves data security ie Cryptography…
Here, in this paper we discuss how data can be made secure for IoT using Cryptography…
Here, in this paper we discuss how data can be made secure for IoT using Cryptography…
[PDF][PDF] Internet of things: IETF protocols, algorithms and applications
MS Kumar, KJ Prakash - Int. J. Innov. Technol. Explor. Eng, 2019 - researchgate.net
… for decryption, Eg RSA algorithm. In this work for the data encryption they used two main
algorithms ie AES and RSA algorithms. AES is a symmetric key cryptography to use same keys …
algorithms ie AES and RSA algorithms. AES is a symmetric key cryptography to use same keys …
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
… whether their cryptographic algorithms suit IoT network traits and features. Cryptography is
the most effective method of data security [29,30]. It is critical to use cryptographic methods for …
the most effective method of data security [29,30]. It is critical to use cryptographic methods for …
Lightweight cryptography for the Internet of Things
A Hassan - Proceedings of the Future Technologies Conference …, 2021 - Springer
… the lightweight cryptographic algorithms area for IoT … cryptographic algorithms proposed
by various researchers. According to this survey, we recommended two lightweight algorithms …
by various researchers. According to this survey, we recommended two lightweight algorithms …
Security in the internet of things: a review
… cryptographic algorithm and lightweight cryptographic protocol. At the same time the integrity
and authenticity of sensor data is becoming research focus, we will discuss this question …
and authenticity of sensor data is becoming research focus, we will discuss this question …
Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment
M Jammula, VM Vakamulla… - Journal of Interconnection …, 2022 - World Scientific
… cryptography algorithms to maintain. Further, it is necessary to identify the suitable cryptography
… Therefore, this article aims to introduce the detailed survey on various cryptographic …
… Therefore, this article aims to introduce the detailed survey on various cryptographic …
Securing the future internet of things with post‐quantum cryptography
… will be capable of resisting quantum algorithms or attacks. Thus, … algorithms require much
larger key sizes. Thus, integration of IoT networks with post-quantum cryptography algorithms …
larger key sizes. Thus, integration of IoT networks with post-quantum cryptography algorithms …
[HTML][HTML] Analysis of the Cryptographic Algorithms in IoT Communications
… cryptographic algorithms. Trying to evaluate the performance impact of those algorithms in …
paper we tested the impact of different cryptographic algorithms in low computational devices, …
paper we tested the impact of different cryptographic algorithms in low computational devices, …
Algorithmic method of security of the Internet of Things based on steganographic coding
A Kabulov, I Saymanov, I Yarashov… - … IOT, Electronics and …, 2021 - ieeexplore.ieee.org
In the Internet of Things, it is more important than ever to effectively address the problem of
secure transmission based on steganographic substitution by synthesizing digital sensor data…
secure transmission based on steganographic substitution by synthesizing digital sensor data…
Internet of things security: challenges and key issues
… discovered by the third party, the encryption algorithms and cryptographic methods can be
used [89]. … In this situation, the hash functions or cryptography algorithm are recommended. …
used [89]. … In this situation, the hash functions or cryptography algorithm are recommended. …