2016 Online International Conference on Green Engineering and Technologies (IC-GET) 2016
DOI: 10.1109/get.2016.7916703
|View full text |Cite
|
Sign up to set email alerts
|

Light weight cryptographic algorithms for medical internet of things (IoT) - a review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…In addition to the greater number of devices, each year the computing power of these devices also increases, and their size and price decrease. The growth in the number of messages exchanged containing the most varied types of information generates a significant concern in relation to the security and privacy of users [7]. As a result, adequate information security techniques are being studied and developed for this new scenario.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to the greater number of devices, each year the computing power of these devices also increases, and their size and price decrease. The growth in the number of messages exchanged containing the most varied types of information generates a significant concern in relation to the security and privacy of users [7]. As a result, adequate information security techniques are being studied and developed for this new scenario.…”
Section: Related Workmentioning
confidence: 99%
“…The Estonia government has already replace their RSA key to ECC for eID due to ROCA vulnerability [19]. In order to cope with the size and power drain requirements of the embedded systems, the NIST and international organisations like ISO/IEC (International Organization for Standardization and the International Electrotechnical Commission) outlines different Lightweight cryptography specifically designed for such systems [20]. In general, the three pillars for the lightweight cryptography are [13]:…”
Section: Literature Reviewmentioning
confidence: 99%
“…SIMON, SPECK, PRINCE, HIGHT, ECC, HUMMING BIRD are few of the examples. The detailed comparison of these algorithms is given in [5], [9]. The classification of algorithms can be done based on their key size, Block Size, Rounds and type (Symmetric or Asymmetric).…”
Section: Lightweight Cryptographymentioning
confidence: 99%
“…The classification of algorithms can be done based on their key size, Block Size, Rounds and type (Symmetric or Asymmetric). The selection of algorithm depends on parameters like Speed, Efficiency, Throughput, Memory requirement, Time Required to execute [5], [7], [9]. [3] Salim ELBOUANANI Ahmed EL KIRAM Omar OCH-BAROU had described Basic IoT device model, IoT categories and Sub-Categories, IoT Statistics in their paper.…”
Section: Lightweight Cryptographymentioning
confidence: 99%
See 1 more Smart Citation