The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Encryption Principles and Techniques for the Internet of Things
|
Author(s): Kundankumar Rameshwar Saraf (Dr. D. Y. Patil College of Engineering Lohegaon, India)and Malathi P. Jesudason (Dr. D. Y. Patil College of Engineering Akurdi, India)
Copyright: 2019
Pages: 25
Source title:
Cryptographic Security Solutions for the Internet of Things
Source Author(s)/Editor(s): Mohammad Tariq Banday (University of Kashmir, India)
DOI: 10.4018/978-1-5225-5742-5.ch002
Purchase
|
Abstract
This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.
Related Content
Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda.
© 2024.
26 pages.
|
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha.
© 2024.
20 pages.
|
K. Sriprasadh.
© 2024.
24 pages.
|
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh.
© 2024.
20 pages.
|
R. Jayashree, J. Venkata Subramanian.
© 2024.
14 pages.
|
M. Indira, K. S. Mohanasundaram, M. Saranya.
© 2024.
14 pages.
|
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith.
© 2024.
26 pages.
|
|
|