Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
… These IoT devices could be divided into two main categories (Figure 1): rich in resources …
In this paper, we focus on the second category of IoT devices. These connected devices are …
In this paper, we focus on the second category of IoT devices. These connected devices are …
A survey of cryptographic algorithms for IoT devices
S Surendran, A Nassef… - 2018 IEEE Long Island …, 2018 - ieeexplore.ieee.org
… ) the commonly used cryptographic algorithms consume a significant … IOT as resource
constraint devices is a resourceefficient cryptographic algorithms which are lightweight algorithms …
constraint devices is a resourceefficient cryptographic algorithms which are lightweight algorithms …
Energy efficient lightweight cryptography algorithms for IoT devices
… These security algorithms are known to be software efficient compared to hardware …
algorithms might be a solution for those IoT devices which suffer from area and power. An algorithm …
algorithms might be a solution for those IoT devices which suffer from area and power. An algorithm …
A review on lightweight cryptography algorithms for data security and authentication in IoTs
… are a good method to ensure information security in the IoT. But still many IoT devices
are … In this section a survey on lightweight cryptography algorithms is done. Based on it …
are … In this section a survey on lightweight cryptography algorithms is done. Based on it …
Cryptography algorithms for enhancing IoT security
… The discussion of cryptographic algorithms will continue in this article. The following is a …
framework for IoT agents in which virtual clones of IoT devices run in a cloud environment. …
framework for IoT agents in which virtual clones of IoT devices run in a cloud environment. …
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
… device for IoT environment in details. We analyze many lightweight cryptographic algorithms
… In addition, we discuss the security architecture in IoT for constrained device environment, …
… In addition, we discuss the security architecture in IoT for constrained device environment, …
A recent review on lightweight cryptography in IoT
… IoT application is useful to people but if the IoT system can't protect the user data from … of
a classical cryptographic algorithm Sthat is pertinent for resource constrained devices in IoT. …
a classical cryptographic algorithm Sthat is pertinent for resource constrained devices in IoT. …
Lightweight cryptography algorithms for internet of things enabled networks: An overview
… of devices are interconnected. This paper presents the security threats and requirements
of IoT cryptography, … Very few algorithms are proficient in providing security to IoT devices. …
of IoT cryptography, … Very few algorithms are proficient in providing security to IoT devices. …
Security of internet of things based on cryptographic algorithms: a survey
… The middleware layer is accountable for service management over IoT devices to make
connections between IoT devices that provide the same service [22, 23]. Moreover, the …
connections between IoT devices that provide the same service [22, 23]. Moreover, the …
Performance analysis of security algorithms for IoT devices
N Khan, N Sakib, I Jerin, S Quader… - 2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
… This paper concentrates on current cryptographic security algorithms, implementing them …
on the device. It also shows the use of cryptographic algorithms and algorithms which use …
on the device. It also shows the use of cryptographic algorithms and algorithms which use …
相关搜索
- lightweight cryptography algorithms iot devices
- encryption algorithms iot devices
- security algorithms iot devices
- cryptographic algorithms internet of things
- survey of cryptographic algorithms iot devices
- lightweight cryptography algorithms iot sensor nodes
- cryptographic ciphers iot devices
- hybrid cryptographic algorithm
- iot security efficient lightweight cryptographic algorithm
- resource constrained iot devices
- analysis of cryptographic algorithms
- data security and authentication cryptography algorithms
- software implementation iot devices
- survey challenges and solutions iot devices
- block cipher design iot devices
- lightweight cryptographic algorithms iot applications