Encryption Protocols on Wireless IoT Tools

被引:1
|
作者
Sahinaslan, Onder [1 ]
机构
[1] Maltepe Univ, Informat Technol, Istanbul, Turkey
关键词
Wireless IoT Security; Cryptography; IoT Protocols; Encryption Algorithms;
D O I
10.1063/1.5095121
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Internet of Things and Security (IoT) is now prevalent in every aspect of our lives. Moreover, the number of wireless electronic devices which can be controlled remotely has proliferated. However, a range of varied difficulties such as data transfer, energy supply, and security may occur in IoT devices; therefore, it is imperative that the most suitable connection type be chosen for the sake of the efficiency and security of the process. The choice of cryptological keys exerts direct influence on data security, instant data density, and the length of the encryption time, and excess processing power, on the other hand, shortens battery life. This study has been conducted in order to inspect the preferable cryptological keys, for wireless smart-devices equipped with latest technology, in terms of speed and reliability.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
    Matsumoto, Marin
    Oguchi, Masato
    2021 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2021), 2021, : 270 - 275
  • [22] Revisiting Lightweight Encryption for IoT Applications: Error Performance and Throughput in Wireless Fading Channels With and Without Coding
    Khattabi, Yazid M.
    Matalgah, Mustafa M.
    Olama, Mohammed M.
    IEEE ACCESS, 2020, 8 : 13429 - 13443
  • [23] IoT based thermal aware routing protocols in wireless body area networks: Survey: IoT based thermal aware routing in WBAN
    Marandi, Shabnam Jalili
    Golsorkhtabaramiri, Mehdi
    Hosseinzadeh, Mehdi
    Jassbi, Somayyeh Jafarali
    IET COMMUNICATIONS, 2022, 16 (15) : 1753 - 1771
  • [24] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289
  • [25] Optimal Design of Encryption Module in IoT
    Han, Ke
    Duan, Youyan
    Jin, Rui
    Wu, Wendou
    Wang, Baijuan
    Cai, Xiaobo
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 481 - 487
  • [26] A Review of Functional Encryption in IoT Applications
    Shahzad, Khurram
    Zia, Tanveer
    Qazi, Emad-Ul-Haq
    SENSORS, 2022, 22 (19)
  • [27] A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT
    Abid, Khaled
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    COMPUTER NETWORKS, 2021, 201 (201)
  • [28] Bridging wireless protocols
    Noerenberg, JW
    IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (11) : 90 - 97
  • [29] IoT network protocols comparison for the purpose of IoT constrained networks
    Hedi, I.
    Speh, I.
    Sarabok, A.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 501 - 505
  • [30] Towards Better Routing Protocols for IoT
    Ali, Shafqat
    Ahmed, Adnan
    Raza, Muhammad
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,