End to End encryption in resource-constrained IoT device

نویسندگان

چکیده

Internet of Things (IoT) technologies will interconnect with a wide range network devices, regardless their local and resource capacities. Ensuring the security, communication, privacy protection end-users is major concern in IoT development. Secure communication significant requirement for various applications, especially when devices have limited resources. The emergence also necessitates use low-power that each other essential processing. These are expected to handle large amounts monitoring control data while having capabilities algorithm used secure encryption should protect vulnerable devices. Conventional methods such as RSA or AES computationally expensive require memory, which can adversely affect device performance. Simplistic techniques easily compromised. To address these challenges, an effective lightweight cryptographic process proposed computer This utilizes symmetrical key block, incorporating custom proxy (SP) modified Feistel architecture. Security analysis performance evaluation results demonstrate protocol energy-efficient. symmetric scheme based on sequences cipher, multiple rounds sub-keys generated using principles derived from genetic algorithms. minimizes processing cycles providing sufficient security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STEED — Usable End-to-End Encryption

End-to-end e-mail encryption is still ignored by almost all users. The mails are left in the clear in the mailboxes of the web mail providers, where they are frequently collected by attackers and lead to an escalation of the attack due to the sensitivity of the mail content. We suggest a new and simplified infrastructure to protect mail that is compatible with OpenPGP and S/MIME and relies on a...

متن کامل

End-to-end esophagojejunostomy versus standard end-to-side esophagojejunostomy: which one is preferable?

 Abstract Background: End-to-side esophagojejunostomy has almost always been associated with some degree of dysphagia. To overcome this complication we decided to perform an end-to-end anastomosis and compare it with end-to-side Roux-en-Y esophagojejunostomy. Methods: In this prospective study, between 1998 and 2005, 71 patients with a diagnosis of gastric adenocarcinoma underwent total gastrec...

متن کامل

End–to–End Encryption in the TTSoC Architecture

Current cryptographic techniques pose high computational requirements on the executing system. Particularly in embedded systems, where limited resources regarding computational power, energy, and cost are a common case, this can lead to difficulties when establishing the required security properties. Our approach tackles the problem of limited recources by introducing a crypto–enabled memory wh...

متن کامل

Comparison of nerve repair with end to end, end to side with window and end to side without window methods in lower extremity of rat

  Abstract   Background : Although, different studies on end-to-side nerve repair, results are controversial. The importance of this method in case is unavailability of proximal nerve. In this method, donor nerves also remain intact and without injury. In compare to other classic procedures, end-to-side repair is not much time consuming and needs less dissection. Overall, the previous studies i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3292829