Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Advancing IoT Security: Cryptographic Enhancements and Open Challenges

View through CrossRef
The tremendous increase of data produced by Internet of Things (IoT) networks emphasizes how important to have robust security mechanisms in place to guarantee authenticity, integrity, and confidentiality. Due to inherent limitations of IoT devices, like limited memory, computing power, and energy consumption, they are particularly vulnerable to security threats and attacks. This paper comprehensively surveys possible cryptographic solutions to enhance IoT cybersecurity, discusses cryptographic algorithm classification, implementation problems, and performance parameters in the IoT ecosystem. This study explores common cryptographic optimization techniques using meta-heuristic algorithms (MHA), machine learning (ML), and blockchain (BC). A taxonomy of emerging technology solutions was demonstrated based on IoT security issues. Additionally, the paper explores cryptographic improvement challenges in the IoT environment with possible solutions.
Title: Advancing IoT Security: Cryptographic Enhancements and Open Challenges
Description:
The tremendous increase of data produced by Internet of Things (IoT) networks emphasizes how important to have robust security mechanisms in place to guarantee authenticity, integrity, and confidentiality.
Due to inherent limitations of IoT devices, like limited memory, computing power, and energy consumption, they are particularly vulnerable to security threats and attacks.
This paper comprehensively surveys possible cryptographic solutions to enhance IoT cybersecurity, discusses cryptographic algorithm classification, implementation problems, and performance parameters in the IoT ecosystem.
This study explores common cryptographic optimization techniques using meta-heuristic algorithms (MHA), machine learning (ML), and blockchain (BC).
A taxonomy of emerging technology solutions was demonstrated based on IoT security issues.
Additionally, the paper explores cryptographic improvement challenges in the IoT environment with possible solutions.

Related Results

Cryptographic Techniques for Secure IoT Data Transmission
Cryptographic Techniques for Secure IoT Data Transmission
The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling interconnected devices to communicate and exchange data seamlessly. However, the trans...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Sentencing Enhancements
Sentencing Enhancements
Sentencing enhancements are policies that mandate that people who are convicted of criminalized behaviors while engaging in generally non-criminalized behaviors—such as being in a ...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Analysis of cryptographic methods for ensuring security in the field of internet of things
Analysis of cryptographic methods for ensuring security in the field of internet of things
The number of internet of things (IoT) devices continues to grow, and so do the associated concerns regarding their security and privacy. Evaluating the efficacy of cryptographic s...
Applications of Ontology in the Internet of Things: A Systematic Analysis
Applications of Ontology in the Internet of Things: A Systematic Analysis
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and obj...
Analysis and Development of Security Framework for IOT Device
Analysis and Development of Security Framework for IOT Device
Internet of Things (IoT) devices are growing rapidly, making security and privacy crucial. This study analyses and develops an IoT-specific security framework. To address the speci...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

Back to Top