With the advent of technologies like Internet of Things (IoT) and Machine to Machine (M2M) communication, a huge quantity of data is generated every day. Being a distributed system of constrained devices, this data needs to be communicated securely without wasting the resources of constrained devices. Therefore there is need of appropriate lightweight security protocols to avoid the security threat to future internet. In this context, a study of lightweight security algorithms is presented in this paper. The algorithms are first theoretically analyzed followed by their implementation on Cryptool and Raspberry Pi in order to check their efficacy
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
The acknowledgment of IoT requires a colossal measure of sensor hubs which have limited battery powe...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new con...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
With the current fast paced growth in the number of devices connected to the internet, many of these...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
The acknowledgment of IoT requires a colossal measure of sensor hubs which have limited battery powe...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new con...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
With the current fast paced growth in the number of devices connected to the internet, many of these...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...