Javascript must be enabled to continue!
Analysis of cryptographic methods for ensuring security in the field of internet of things
View through CrossRef
The number of internet of things (IoT) devices continues to grow, and so do the associated concerns regarding their security and privacy. Evaluating the efficacy of cryptographic solutions within IoT systems emerges as a crucial endeavor to uphold the integrity and reliability of these systems. Amidst the rapid evolution of IoT technology, safeguarding the confidentiality, integrity, and availability of data emerges as a top priority. This article underscores the significance of deploying robust cryptographic algorithms to fortify IoT devices against a myriad of potential threats. Effective evaluation of cryptographic solutions within IoT systems entails a comprehensive analysis and comparison of diverse algorithms, coupled with an assessment of their performance, resilience against attacks, and resource utilization. Central to evaluating the effectiveness of cryptographic solutions within IoT systems is a consideration of various factors including computational complexity, power consumption of devices, ease of implementation, and compatibility with existing infrastructures. This article reviews a number of cryptographic solutions including Rivest–Shamir–Adleman (RSA), El-Gamal, Paillier. These algorithms are implemented on the ATmega2560 microcontroller, which allows for a comprehensive assessment of key parameters such as efficiency in terms of encryption and decryption time, power consumption, and memory usage of IoT devices.
Institute of Advanced Engineering and Science
Title: Analysis of cryptographic methods for ensuring security in the field of internet of things
Description:
The number of internet of things (IoT) devices continues to grow, and so do the associated concerns regarding their security and privacy.
Evaluating the efficacy of cryptographic solutions within IoT systems emerges as a crucial endeavor to uphold the integrity and reliability of these systems.
Amidst the rapid evolution of IoT technology, safeguarding the confidentiality, integrity, and availability of data emerges as a top priority.
This article underscores the significance of deploying robust cryptographic algorithms to fortify IoT devices against a myriad of potential threats.
Effective evaluation of cryptographic solutions within IoT systems entails a comprehensive analysis and comparison of diverse algorithms, coupled with an assessment of their performance, resilience against attacks, and resource utilization.
Central to evaluating the effectiveness of cryptographic solutions within IoT systems is a consideration of various factors including computational complexity, power consumption of devices, ease of implementation, and compatibility with existing infrastructures.
This article reviews a number of cryptographic solutions including Rivest–Shamir–Adleman (RSA), El-Gamal, Paillier.
These algorithms are implemented on the ATmega2560 microcontroller, which allows for a comprehensive assessment of key parameters such as efficiency in terms of encryption and decryption time, power consumption, and memory usage of IoT devices.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
An information security analysis method of Internet of things based on balanced double SVM
An information security analysis method of Internet of things based on balanced double SVM
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems e...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...

