Lightweight security algorithm for low power IoT devices

TK Goyal, V Sahula - 2016 international conference on …, 2016 - ieeexplore.ieee.org
… electronics applications require secure communication, for example the Internet of things
devices. … Security of a cryptography algorithm depends on the key size used. Difficulty in AES …

Performance analysis of security algorithms for IoT devices

N Khan, N Sakib, I Jerin, S Quader… - 2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
devices behind a network firewall. This paper concentrates on current cryptographic security
algorithms, … the overall impact it creates on the device. It also shows the use of cryptographic …

Efficient security algorithm for power-constrained IoT devices

JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… Consequently, the option for constrained IoT devices lies in either developing new security
IoT devices. In this work, an efficient security algorithm for constrained IoT devices, based on …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
device for IoT environment in details. We analyze many lightweight cryptographic algorithms
… In addition, we discuss the security architecture in IoT for constrained device environment, …

Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
… The security of IoT devices is a significant issue due to the increasing numbers of services
and … This paper reviews IoT security threats based on cryptography algorithms that lead to IoT

IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?

L Xiao, X Wan, X Lu, Y Zhang… - IEEE Signal Processing …, 2018 - ieeexplore.ieee.org
… The IoT device applies the e-greedy algorithm in the offloading policy selection, in which
the offloading policy with the max Q-value is selected with a high probability and the other …

Security issues in IoT: A survey

A Hameed, A Alomary - 2019 International conference on …, 2019 - ieeexplore.ieee.org
… to apply the existing security method on it. … algorithms which support the IoT devices. The
survey in this paper reviewed several proposed algorithms and authentication methods in IoT to …

Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
… for IoT agents in which virtual clones of IoT devices run in a … for a resource-constrained IoT
device and a standard Internet … -protected secure CoAP protocol for IoT devices and cloud-…

Security on IoT devices with secure elements

T Schläpfer, A Rüst - Embedded World Conference …, 2019 - digitalcollection.zhaw.ch
… require leaf nodes to provide a higher level of security, similar to the level of a standard …
device cost, the intensive cryptographic operations of well-known computer security algorithms

A review on lightweight cryptography algorithms for data security and authentication in IoTs

I Bhardwaj, A Kumar, M Bansal - 2017 4th International …, 2017 - ieeexplore.ieee.org
… network is discussed so to keep all connected devices secure security required. The IoT
security classify in 3 ways. These are • Security and Data Protection: Since IoT devices are …