Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
… , encryption ensures that user integrity, confidentiality, privacy, and authentication are preserved.
In the present study, ECC cryptographic algorithm and … Results of comparative analysis

Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications

MK Hasan, M Shafiq, S Islam, B Pandey… - …, 2021 - Wiley Online Library
… This article will conduct a comparative study of RSA, DES, … encryption algorithms to protect
the Internet of Things (IoT) applications. The experimental analysis includes the comparison

Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
cryptography, a lighter version of cryptography. More than fifty lightweight cryptography (plain
encryption) algorithms are … (s), and another 57 algorithms have been submitted by the …

Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems

SK Mousavi, A Ghaffari, S Besharat… - Journal of Ambient …, 2021 - Springer
cryptographic algorithm based on Rivest cipher (RC4), Elliptic-Curve Cryptography (ECC),
and Secure Hash Algorithm … by the ECC algorithm, and the output of this encryption process is …

Cryptographic technologies and protocol standards for Internet of Things

S Zeadally, AK Das, N Sklavos - Internet of Things, 2021 - Elsevier
… well-known cryptographic algorithm … a comparative study of the various protocol standards
for several IoT application domains followed by the standardization areas for cryptographic

Lightweight cryptography for internet of insecure things: A survey

IK Dutta, B Ghosh, M Bayoumi - 2019 IEEE 9th Annual …, 2019 - ieeexplore.ieee.org
… A comparative study was done by [7] among RSA, DiffieHellman and Elliptical Curve … for
Internet of Things. We surveyed research work on Asymmetric cryptographic algorithms and …

Data encryption for internet of things applications based on catalan objects and two combinatorial structures

MH Saračević, SZ Adamović… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… a comparative analysis of the proposed encryption method with … the cryptographic algorithm
itself (for example, designing an … and IoT devices,” IEEE Internet Things J., vol. 3, no. 6, pp. …

[HTML][HTML] Comparative study of different cryptographic algorithms

BEHH Hamouda - Journal of Information Security, 2020 - scirp.org
… key for both encryption and decryption. In this paper I have analyzed comparative encryption
algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), …

[HTML][HTML] Prisec: Comparison of symmetric key algorithms for iot devices

DAF Saraiva, VRQ Leithardt, D de Paula… - Sensors, 2019 - mdpi.com
… On its first phase, we intend to analyze different symmetric key algorithms to determine their
… Since UbiPri will be used in an IoT context, we must choose secure cryptography algorithms

[HTML][HTML] Security trends in Internet of Things: A survey

Rachit, S Bhatt, PR Ragiri - SN Applied Sciences, 2021 - Springer
… discussed IoT architecture and made a comparative analysis of protocols and standards
used in IoT. Our second research contribution includes exploring all possible aspects of recent …