Towards Light Weight Cryptography Schemes for Resource Constraint Devices in IoT

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices

Traditional heavyweight routing algorithms are not suitable for resource constrained IEEE 802.15.4 [15] complaint devices. Although, ZigBee [21] provided an addressing scheme and a table-free Tree routing algorithm for such devices, it has several limitations [6, 7, 8, 9]. In this paper, we have proposed a flexible, variable-length addressing scheme together with a new lightweight, table-free r...

متن کامل

Cryptography for Resource Constrained Devices: A Survey

Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...

متن کامل

Applicable Light-weight Cryptography to Secure Medical Data in Iot Systems

Different applications require different level of security where the scarce of resource plays effective role. In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must. Electronic sensors are used to collect medical data from the patient's body acquiring its transmission to the healthcare system securely. It is ...

متن کامل

A Distributed Security Mechanism for Resource-Constrained IoT Devices

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...

متن کامل

IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices

In recent years, the emerging Internet-of-Things (IoT) has led to concerns about the security of networked embedded devices. There is a strong need to develop suitable and costefficient methods to find vulnerabilities in IoT devices in order to address them before attackers take advantage of them. In traditional IT security, honeypots are commonly used to understand the dynamic threat landscape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mobile Multimedia

سال: 2020

ISSN: 1550-4654,1550-4646

DOI: 10.13052/jmm1550-4646.1521