Towards Light Weight Cryptography Schemes for Resource Constraint Devices in IoT
نویسندگان
چکیده
منابع مشابه
Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices
Traditional heavyweight routing algorithms are not suitable for resource constrained IEEE 802.15.4 [15] complaint devices. Although, ZigBee [21] provided an addressing scheme and a table-free Tree routing algorithm for such devices, it has several limitations [6, 7, 8, 9]. In this paper, we have proposed a flexible, variable-length addressing scheme together with a new lightweight, table-free r...
متن کاملCryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملApplicable Light-weight Cryptography to Secure Medical Data in Iot Systems
Different applications require different level of security where the scarce of resource plays effective role. In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must. Electronic sensors are used to collect medical data from the patient's body acquiring its transmission to the healthcare system securely. It is ...
متن کاملA Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملIoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices
In recent years, the emerging Internet-of-Things (IoT) has led to concerns about the security of networked embedded devices. There is a strong need to develop suitable and costefficient methods to find vulnerabilities in IoT devices in order to address them before attackers take advantage of them. In traditional IT security, honeypots are commonly used to understand the dynamic threat landscape...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mobile Multimedia
سال: 2020
ISSN: 1550-4654,1550-4646
DOI: 10.13052/jmm1550-4646.1521