Javascript must be enabled to continue!
Advancing IoT Security: Cryptographic Enhancements and Open Challenges
View through CrossRef
The tremendous increase of data produced by Internet of Things (IoT) networks emphasizes how important to have robust security mechanisms in place to guarantee authenticity, integrity, and confidentiality. Due to inherent limitations of IoT devices, like limited memory, computing power, and energy consumption, they are particularly vulnerable to security threats and attacks. This paper comprehensively surveys possible cryptographic solutions to enhance IoT cybersecurity, discusses cryptographic algorithm classification, implementation problems, and performance parameters in the IoT ecosystem. This study explores common cryptographic optimization techniques using meta-heuristic algorithms (MHA), machine learning (ML), and blockchain (BC). A taxonomy of emerging technology solutions was demonstrated based on IoT security issues. Additionally, the paper explores cryptographic improvement challenges in the IoT environment with possible solutions.
Salahaddin University - Erbil
Title: Advancing IoT Security: Cryptographic Enhancements and Open Challenges
Description:
The tremendous increase of data produced by Internet of Things (IoT) networks emphasizes how important to have robust security mechanisms in place to guarantee authenticity, integrity, and confidentiality.
Due to inherent limitations of IoT devices, like limited memory, computing power, and energy consumption, they are particularly vulnerable to security threats and attacks.
This paper comprehensively surveys possible cryptographic solutions to enhance IoT cybersecurity, discusses cryptographic algorithm classification, implementation problems, and performance parameters in the IoT ecosystem.
This study explores common cryptographic optimization techniques using meta-heuristic algorithms (MHA), machine learning (ML), and blockchain (BC).
A taxonomy of emerging technology solutions was demonstrated based on IoT security issues.
Additionally, the paper explores cryptographic improvement challenges in the IoT environment with possible solutions.
Related Results
Cryptographic Techniques for Secure IoT Data Transmission
Cryptographic Techniques for Secure IoT Data Transmission
The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling interconnected devices to communicate and exchange data seamlessly. However, the trans...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Sentencing Enhancements
Sentencing Enhancements
Sentencing enhancements are policies that mandate that people who are convicted of criminalized behaviors while engaging in generally non-criminalized behaviors—such as being in a ...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
In the era of globalization, Internet of Things (IoT) technology has changed the way information is disseminated and accessed, including in the context of spreading Islam. This stu...
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. ...
The Impact of IoT Security on Critical Infrastructure Protection: Current Challenges and Future Directions
The Impact of IoT Security on Critical Infrastructure Protection: Current Challenges and Future Directions
The increasing integration of Internet of Things (IoT) technologies into critical infrastructure systems has revolutionized various industries, making it easier to achieve better e...

