2016
DOI: 10.17485/ijst/2016/v9i28/98382
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Lightweight Cryptographic Solutions for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…While these devices may have limited functionality, they may still collect and transmit personal sensitive information across the internet to web or cloud services. This presents challenges as data being exchanged over the internet is potentially exposed to attack and must be secured [3]. To standardize constrained device communication organizations such as the IETF have developed efficient web standards for constrained devices such as CoAP [4].…”
Section: Security In Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…While these devices may have limited functionality, they may still collect and transmit personal sensitive information across the internet to web or cloud services. This presents challenges as data being exchanged over the internet is potentially exposed to attack and must be secured [3]. To standardize constrained device communication organizations such as the IETF have developed efficient web standards for constrained devices such as CoAP [4].…”
Section: Security In Iot Devicesmentioning
confidence: 99%
“…DTLS protects data confidentiality, integrity, and authenticity of CoAP communications in a comparable way that TLS protects HTTP communication on the web i.e. HTTPS [3] [4]. While suitable for some IoT devices, DTLS is still a heavyweight protocol and so devices must have sufficient resource to run it while still being able to perform the devices intended function e.g.…”
Section: Security In Iot Devicesmentioning
confidence: 99%
“…Security and privacy of IoT are hence of prime importance. The author in [1] resumes the challenges faced by the IoTs as follow: -Passive or non-existent human intervention might lead to physical and logical attacks. • Confidentiality: Data should only be accessible to the sender or receiver whether it is at rest or in transit.…”
Section: Importance Of Security and Its Challenge In The Internet Of mentioning
confidence: 99%
“…The need for security is because there is no uniform infrastructure from one device to another and that these devices communicate wirelessly; all this adding up makes them prone to security attacks such as eavesdrop, Man-In-The-Middle and so; since most of the IoT objects have constraints resources in terms of power, memory and processing capability, it follows that lightweight algorithms are necessary to obtain an efficient end-to-end communication because they use minimal power consumption and less memory than the traditional algorithms such as RSA. [1] Authentication, Integrity, and confidentiality are the pillars of Network Security. In order to be properly secured, each device in the IoT network should authenticate itself to the rest of the devices each time that communication is initiated.…”
Section: Introductionmentioning
confidence: 99%
“…are considered as smart things. "IoT can be defined as a network of uniquely identifiable, accessible, and manageable smart things that are capable of performing communication, computation and ultimate decision making" [1]. "It is aunified part of Future Internet and could be defined as a dynamic global network infrastructure with self-configuring capabilities based on standard and interoperable communication protocols where physical and virtual "things" have identities, physical attributed, use intelligent interfaces, and are seamlessly integrated into the information network" [2].…”
Section: Introductionmentioning
confidence: 99%