Encryption Protocols on Wireless IoT Tools

被引:1
|
作者
Sahinaslan, Onder [1 ]
机构
[1] Maltepe Univ, Informat Technol, Istanbul, Turkey
关键词
Wireless IoT Security; Cryptography; IoT Protocols; Encryption Algorithms;
D O I
10.1063/1.5095121
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Internet of Things and Security (IoT) is now prevalent in every aspect of our lives. Moreover, the number of wireless electronic devices which can be controlled remotely has proliferated. However, a range of varied difficulties such as data transfer, energy supply, and security may occur in IoT devices; therefore, it is imperative that the most suitable connection type be chosen for the sake of the efficiency and security of the process. The choice of cryptological keys exerts direct influence on data security, instant data density, and the length of the encryption time, and excess processing power, on the other hand, shortens battery life. This study has been conducted in order to inspect the preferable cryptological keys, for wireless smart-devices equipped with latest technology, in terms of speed and reliability.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [2] Evaluating IoT wireless protocols for industrial applications
    Cureton, Andrew
    Control Engineering, 2020, 67 (10) : 20 - 21
  • [3] Cube-Type Algebraic Attacks on Wireless Encryption Protocols
    Petrakos, Nikolaos
    Dinolt, George W.
    Michael, James Bret
    Stanica, Pantelimon
    COMPUTER, 2009, 42 (10) : 103 - 105
  • [4] A Study of Different Routing Protocols and Encryption Algorithms in Wireless Networks
    Geetha, B. T.
    Monika, R.
    Thejasvi, R.
    Vibaasundari, N.
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1213 - 1217
  • [5] Encryption Based on Cellular Automata for Wireless Devices in IoT Environment
    Shanmuganathan, Harinee
    Mahendran, Anand
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (03) : 347 - 355
  • [6] Implementation of a Wireless Sensor Network Using Standardized IoT Protocols
    da Costa, Gustavo A.
    Kleinschmidt, Joao H.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS - 20TH IEEE ISCE, 2016, : 17 - 18
  • [7] Machine Learning and Enhanced Encryption for Edge Computing in IoT and Wireless Networks
    Hardas, Bhalchandra M.
    Raut, Vaishali
    Palsodkar, Prasanna
    Aush, Mithun G.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 200 - 210
  • [8] Performance Evaluation of IoT Protocols under a Constrained Wireless Access Network
    Chen, Yuang
    Kunz, Thomas
    2016 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE & WIRELESS NETWORKING (MOWNET), 2016, : 159 - 165
  • [9] Enhancement in the Performance of Routing Protocols for Wireless Communication Using Clustering, Encryption, and Cryptography
    Dhote, Kanchan
    Asutkar, G. M.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 547 - 558
  • [10] Encryption Switching Protocols
    Couteau, Geoffroy
    Peters, Thomas
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 308 - 338