2020 IEEE International Workshop on Metrology for Industry 4.0 &Amp; IoT 2020
DOI: 10.1109/metroind4.0iot48571.2020.9138236
|View full text |Cite
|
Sign up to set email alerts
|

Security vulnerability in Internet of Things sensor networks protected by Advanced Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 36 publications
0
2
0
1
Order By: Relevance
“…Untuk dapat meningkatkan keamanan daripada model smartdoor saat ini, penelitian ini membuat sebuah model smart door dengan algoritma Advanced Encryption Standard untuk mengamankan data di dalam server dan perangkat pendeteksi. Algoritma ini menyediakan pengamanan data dengan kekuatan enkripsi yang kuat dan memerlukan waktu yang lama untuk memecahnya tanpa kunci yang sesuai [14]. Selain itu algoritma ini juga sangat ringan dijalankan di perangkat IoT tanpa menghambat proses lainnya [15] [16].…”
Section: Gambar 5 Metode Deteksi Wajah Model Standarunclassified
“…Untuk dapat meningkatkan keamanan daripada model smartdoor saat ini, penelitian ini membuat sebuah model smart door dengan algoritma Advanced Encryption Standard untuk mengamankan data di dalam server dan perangkat pendeteksi. Algoritma ini menyediakan pengamanan data dengan kekuatan enkripsi yang kuat dan memerlukan waktu yang lama untuk memecahnya tanpa kunci yang sesuai [14]. Selain itu algoritma ini juga sangat ringan dijalankan di perangkat IoT tanpa menghambat proses lainnya [15] [16].…”
Section: Gambar 5 Metode Deteksi Wajah Model Standarunclassified
“…As a first order approximation, the power of circuit supplied by a constant voltage V DD with a total current i DD (t) will present an instantaneous power dissipation as P Inst given by the product of V DD and i DD (t). The mean power dissipation P Inst during a period T is defined according to Equation (1).…”
Section: A Power Dissipation In Cmos Circuitsmentioning
confidence: 99%
“…The last few decades have seen an increase in concern regarding the protection of information processed in electronic devices driven by the wide use of smartphones, smart cards, and intelligent nodes in IoT applications. Internet shopping activities, bank transactions, ticket reservation systems are examples of typical applications that require the security of confidential data stored and computed on electronic products, however with the development of new technologies, the range of devices under threat now include sensors in wireless sensor networks [1], which usually are in unsupervised locations, and even Cloud Field-Programmable Gate Arrays [2]. Modern devices provide cryptographic algorithms and authentication protocols to protect the systems against malicious users.…”
Section: Introductionmentioning
confidence: 99%