2021
DOI: 10.1007/s11276-020-02535-5
|View full text |Cite
|
Sign up to set email alerts
|

Security of internet of things based on cryptographic algorithms: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 85 publications
(30 citation statements)
references
References 116 publications
0
29
0
1
Order By: Relevance
“…Based on the ideas of RSA and MH algorithms, more public key cryptosystems have been proposed [22], for example, the Rabin algorithm based on the quadratic residual problem, the ElGamal algorithm based on the discrete logarithm, and the ECC algorithm based on the discrete logarithm problem on the elliptic curve. In order to give full play to the respective advantages of symmetric key algorithms and public key algorithms, scholars pointed out that the plaintext is encrypted with triple DES first, and then the keys are transmitted using public key algorithms such as RSA [23]. is mode of combining the two has become the main mode of the encryption system.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the ideas of RSA and MH algorithms, more public key cryptosystems have been proposed [22], for example, the Rabin algorithm based on the quadratic residual problem, the ElGamal algorithm based on the discrete logarithm, and the ECC algorithm based on the discrete logarithm problem on the elliptic curve. In order to give full play to the respective advantages of symmetric key algorithms and public key algorithms, scholars pointed out that the plaintext is encrypted with triple DES first, and then the keys are transmitted using public key algorithms such as RSA [23]. is mode of combining the two has become the main mode of the encryption system.…”
Section: Related Workmentioning
confidence: 99%
“…Mousavi et al 35 have presented an IoT security depends on cryptographic algorithms. The suggested study is an investigation of symmetric, asymmetric and hybrid encryption algorithms of IoT security.…”
Section: Related Work: a Brief Reviewmentioning
confidence: 99%
“…It can be seen that the management of keys is the most worthy of attention in any cryptographic algorithm or even cryptosystem. The Internet of Things is composed of a variety of heterogeneous networks, such as sensor networks at the perception layer and the Internet at the network layer [ 2 , 3 ].…”
Section: Introductionmentioning
confidence: 99%