2020
DOI: 10.1007/s12652-020-02303-5
|View full text |Cite
|
Sign up to set email alerts
|

Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(29 citation statements)
references
References 51 publications
0
29
0
Order By: Relevance
“…In the future, the importance of lightweight cryptographic authentication and hash authentication model can not be ignored, therefore, we also acknowledge the research community to utilize these types of authentication models in collaboration with edge and fog computing to address the communication and authentication problems in H-IoT applications ( Mousavi et al., 2021 ). Furthermore, we also believe that lightweight authentication did not create network overhead, which is a positive sign for their utilization in healthcare.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…In the future, the importance of lightweight cryptographic authentication and hash authentication model can not be ignored, therefore, we also acknowledge the research community to utilize these types of authentication models in collaboration with edge and fog computing to address the communication and authentication problems in H-IoT applications ( Mousavi et al., 2021 ). Furthermore, we also believe that lightweight authentication did not create network overhead, which is a positive sign for their utilization in healthcare.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…Mousavi et al 36 have presented an improvement of the security of the IoT using cryptographic algorithms. In this document, the RC4 key is encrypted by the ECC algorithm, and the output of this encryption process is transformed into SHA‐256 for hashing and generating cryptic data.…”
Section: Related Work: a Brief Reviewmentioning
confidence: 99%
“…The system uses the CC1310 SOC to design nodes with long-distance capability and low energy usage. Also, the proposed mechanism combines irrigation, to s 6LoWPAN and fuzzyfor irrigation forecasting.In [27], protecting and improving the safety of the proposed encryption algorithm, IoT irrigation system. In this study, he said, it is important to ensure the safety of less intensive, devices where encryption is one of the most noticeable solutions to maintain integrity and confidentiality in nodes.The work [28] offered solar system security intellectual irrigation system IoT.…”
Section: Literature Surveymentioning
confidence: 99%