Proceedings of the 2nd International Conference on Future Networks and Distributed Systems 2018
DOI: 10.1145/3231053.3231100
|View full text |Cite
|
Sign up to set email alerts
|

A review of data security and cryptographic techniques in IoT based devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 12 publications
0
9
0
1
Order By: Relevance
“…The solutions to be proposed must also ensure the integrity of the data stored by hashing and time-stamping. Current data privacy mechanisms implement crypto-systems such as AES and ECC (Ammar et al, 2018;Goyal and Sahula, 2016;Mahajan and Sachdeva, 2013;Mustafa et al, 2018;Singh et al, 2017). However, the efficient management of encryption/decryption keys remains one of the challenges.…”
Section: Research Directionsmentioning
confidence: 99%
“…The solutions to be proposed must also ensure the integrity of the data stored by hashing and time-stamping. Current data privacy mechanisms implement crypto-systems such as AES and ECC (Ammar et al, 2018;Goyal and Sahula, 2016;Mahajan and Sachdeva, 2013;Mustafa et al, 2018;Singh et al, 2017). However, the efficient management of encryption/decryption keys remains one of the challenges.…”
Section: Research Directionsmentioning
confidence: 99%
“…Other works suggest using lightweight encryption as a low-power, memory-efficient encryption standard that requires low computing power [6]. In [7], [8], two comprehensive reviews have been conducted on the literature relating to encryption standards used for IoT applications. The reviews concluded that classic encryption standards like AES, DES, RSA and TDES cannot be used efficiently due to their complex implementation requiring large memory and high computing facilities.…”
Section: Introductionmentioning
confidence: 99%
“…Many symmetrical encryption standards exist today such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES) [4], Blowfish [5], Secure And Fast Encryption Routine (SAFER+) [6], and the Rijndael which is selected by the U.S. National Institute of Standards and Technology (NIST) as the actual Advanced Encryption Standard (AES) since 2001 [7,8]. Symmetric key encryption standards are divided into two types; the block and stream encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%