S Surendran, A Nassef… - 2018 IEEE Long Island …, 2018 - ieeexplore.ieee.org
… ) the commonly used cryptographicalgorithms consume a significant … IOT as resource constraint devices is a resourceefficient cryptographicalgorithms which are lightweight algorithms …
… The discussion of cryptographicalgorithms will continue in this article. The following is a … framework for IoT agents in which virtual clones of IoTdevices run in a cloud environment. …
I Bhardwaj, A Kumar, M Bansal - 2017 4th International …, 2017 - ieeexplore.ieee.org
… are a good method to ensure information security in the IoT. But still many IoTdevices are … In this section a survey on lightweight cryptographyalgorithms is done. Based on it …
TK Goyal, V Sahula, D Kumawat - IETE Journal of Research, 2022 - Taylor & Francis
… These security algorithms are known to be software efficient compared to hardware … algorithms might be a solution for those IoTdevices which suffer from area and power. An algorithm …
ER Naru, H Saini, M Sharma - … on I-SMAC (IoT in social, mobile …, 2017 - ieeexplore.ieee.org
… IoT application is useful to people but if the IoT system can't protect the user data from … of a classical cryptographicalgorithm Sthat is pertinent for resource constrained devices in IoT. …
… device for IoT environment in details. We analyze many lightweight cryptographicalgorithms … In addition, we discuss the security architecture in IoT for constrained device environment, …
… The middleware layer is accountable for service management over IoTdevices to make connections between IoTdevices that provide the same service [22, 23]. Moreover, the …
… right choice for IoT edge nodes or implantable medical devices. … of these devices, we need to look for encryption algorithms that … Such algorithms are known as lightweight cryptography (…
N Khan, N Sakib, I Jerin, S Quader… - 2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
… This paper concentrates on current cryptographic security algorithms, implementing them … on the device. It also shows the use of cryptographicalgorithms and algorithms which use …