2021
DOI: 10.1007/978-3-030-69143-1_34
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Lightweight Cryptographic Algorithm for IoT Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 29 publications
2
3
0
Order By: Relevance
“…It was observed that the RSA algorithm generated large files and consumed more space (memory) during the encryption process of all categories of text, audio, image, and video data concerning the CPU's internal memory usage. This is consistent with the existing literature (Meshram et al, 2022;Abdulraheem et al, 2021a;Oladipupo et al, 2023). ElGamal algorithm outperformed the RSA algorithm in terms of memory usage.…”
Section: Discussionsupporting
confidence: 91%
See 2 more Smart Citations
“…It was observed that the RSA algorithm generated large files and consumed more space (memory) during the encryption process of all categories of text, audio, image, and video data concerning the CPU's internal memory usage. This is consistent with the existing literature (Meshram et al, 2022;Abdulraheem et al, 2021a;Oladipupo et al, 2023). ElGamal algorithm outperformed the RSA algorithm in terms of memory usage.…”
Section: Discussionsupporting
confidence: 91%
“…It is a measure of how 'good' the algorithm is at solving the problem. It can also be described as the efficiency of the algorithm in terms of the amount of data the algorithm must process (Abdulraheem et al, 2021a). Typically, the complexity of an algorithm is a function that maps the input length/size to the number of main stages (time complexity) or specific storage positions (space complexity).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Machine-to-machine (M2M) and machine-to-person (M2P) connections to the network are used in IIoTs using the TCP/IP interface using various IIoT protocols [9,10]. The number IIoTs have the number of flaws and bugs that can be abused using a range of advanced attack methods which has increased significantly.…”
Section: Introductionmentioning
confidence: 99%
“…In 2021, the authors in [23] proposes a new modification of TEA for securing data in IoT devices. The proposed algorithm is based on block ciphers and hash functions, which enables efficient encryption and decryption of data while also ensuring data integrity.…”
Section: Literature Reviewmentioning
confidence: 99%