Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
Submit search
EN
Uploaded by
jaskarans90411
DOCX, PDF
15 views
A SURVEY ABOUT USING CRYPTOGRAPHIC ALGORITHM
A SURVEY ABOUT USING CRYPTOGRAPHIC ALGORITHMS FOR SECURING IOT DEVICES
Data & Analytics
◦
Read more
0
Save
Share
Embed
Embed presentation
Download
Download to read offline
1
/ 7
2
/ 7
3
/ 7
4
/ 7
5
/ 7
6
/ 7
7
/ 7
More Related Content
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
by
PratimanChoubey
PDF
mypresentation.pdf
by
HamzaELKarmaoui
PPTX
Iot Security
by
MAITREYA MISRA
PDF
Internet of Things IoT Security Perspective
by
ijtsrd
PDF
IoT_IS_Presentation_104_159_179_011 (1).pdf
by
israrali99
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
by
IRJET Journal
PDF
509286-Aki_Koivu-Review
by
Aki Koivu
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
by
IRJET Journal
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
by
PratimanChoubey
mypresentation.pdf
by
HamzaELKarmaoui
Iot Security
by
MAITREYA MISRA
Internet of Things IoT Security Perspective
by
ijtsrd
IoT_IS_Presentation_104_159_179_011 (1).pdf
by
israrali99
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
by
IRJET Journal
509286-Aki_Koivu-Review
by
Aki Koivu
IRJET - A Study on Smart Way for Securing IoT Devices
by
IRJET Journal
Similar to A SURVEY ABOUT USING CRYPTOGRAPHIC ALGORITHM
PDF
An Internet of Things Reference Architecture
by
Symantec
PDF
Security in IoT
by
SKS
PPTX
Presentation on IOT SECURITY
by
The Avi Sharma
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
by
ClicTest
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
PPTX
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
by
vedantshrivastava286
PDF
1 importance of light weight authentication in iot
by
Chintan Patel
PDF
76 s201917
by
IJRAT
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
by
IRJET Journal
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
by
IRJET Journal
PDF
Comprehensive survey on security problems and key technologies of the interne...
by
RSIS International
PDF
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
by
RSIS International
PDF
A survey on secure communication protocols for io t systems
by
Vishwesh Nagamalla
PDF
Secure Channel Communication between IOT Devices and Computers
by
IRJET Journal
PDF
White Paper: IoT Security – Protecting the Networked Society
by
Ericsson
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
PDF
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
by
IJCSIS Research Publications
PDF
[TestWarez 2017] Securing the Internet of Things
by
Stowarzyszenie Jakości Systemów Informatycznych (SJSI)
PDF
Most cited articles in academia - International journal of network security &...
by
IJNSA Journal
An Internet of Things Reference Architecture
by
Symantec
Security in IoT
by
SKS
Presentation on IOT SECURITY
by
The Avi Sharma
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
by
ClicTest
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
by
vedantshrivastava286
1 importance of light weight authentication in iot
by
Chintan Patel
76 s201917
by
IJRAT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
by
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
by
IRJET Journal
Comprehensive survey on security problems and key technologies of the interne...
by
RSIS International
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
by
RSIS International
A survey on secure communication protocols for io t systems
by
Vishwesh Nagamalla
Secure Channel Communication between IOT Devices and Computers
by
IRJET Journal
White Paper: IoT Security – Protecting the Networked Society
by
Ericsson
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
by
IJNSA Journal
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
by
IJCSIS Research Publications
[TestWarez 2017] Securing the Internet of Things
by
Stowarzyszenie Jakości Systemów Informatycznych (SJSI)
Most cited articles in academia - International journal of network security &...
by
IJNSA Journal
Recently uploaded
PPTX
[DSC Europe 25] Bassam Maharmeh - Artificial Intelligence: Opportunities and ...
by
DataScienceConferenc1
PPTX
Security information presentation and its importance
by
bilalkingqwq
PDF
[DSC Europe 25] Branko Dzakula - From Defense to Attack: How AI Redefines Cyb...
by
DataScienceConferenc1
PPTX
[DSC Europe 25] Jovan Bogicevic - Legacy to AI-Driven Defense: Transforming D...
by
DataScienceConferenc1
PPTX
[DSC Europe 25] Ivan Peric - Intelligence Swarm Logic and Techno-Functional M...
by
DataScienceConferenc1
PDF
01-Introduction_to_Computers and app.pdf
by
javeriaafsar575
PPTX
[DSC Europe 25] Debmalya Biswas - Agentification: the art of transforming man...
by
DataScienceConferenc1
PPTX
cloud computing ppt useful for studestns
by
NagarajuJajam
PPTX
[DSC Europe 25] Nikolay Burlutskiy - Best Practices for Building Enterprise M...
by
DataScienceConferenc1
PPTX
[DSC Europe 25] Branko Urosevic -Rethinking Financial Talent: Integrating Cod...
by
DataScienceConferenc1
PPTX
[DSC Europe 25] Miodrag Pesovic & Vladislav Radonjic - Federated Data Archite...
by
DataScienceConferenc1
PDF
Terminals into Throughways: Amtrak Through Service to Long Island
by
krv2009
PPTX
Data analysis 2 presentation at ipmc.pptx
by
abdualimohammed960
PPTX
Edison Research's Top 10 Findings of 2025
by
mlazovick
PPTX
CRAFTING A PERSUASIVE STRATEGY PRESENTATION - ORLANDO LIZARRAGA.pptx
by
OrlandoLizarragaCerv
PPTX
Deep Learning The Next Frontier (AI).pptx
by
waheedshahzad6
PPTX
Data-Pre-Processing-and-Visualization-for-Machine-Learning.pptx
by
Muhammad Fahad Bashir
PDF
DiaryofaWebSDKImplemenation-LaunchDebugging.pdf
by
gmuir1066
PPTX
[DSC Europe 25] Kaja Kandare - LLM as a judge.pptx
by
DataScienceConferenc1
PDF
McCrindle 2026 Trends of the Year
by
Mark McCrindle
[DSC Europe 25] Bassam Maharmeh - Artificial Intelligence: Opportunities and ...
by
DataScienceConferenc1
Security information presentation and its importance
by
bilalkingqwq
[DSC Europe 25] Branko Dzakula - From Defense to Attack: How AI Redefines Cyb...
by
DataScienceConferenc1
[DSC Europe 25] Jovan Bogicevic - Legacy to AI-Driven Defense: Transforming D...
by
DataScienceConferenc1
[DSC Europe 25] Ivan Peric - Intelligence Swarm Logic and Techno-Functional M...
by
DataScienceConferenc1
01-Introduction_to_Computers and app.pdf
by
javeriaafsar575
[DSC Europe 25] Debmalya Biswas - Agentification: the art of transforming man...
by
DataScienceConferenc1
cloud computing ppt useful for studestns
by
NagarajuJajam
[DSC Europe 25] Nikolay Burlutskiy - Best Practices for Building Enterprise M...
by
DataScienceConferenc1
[DSC Europe 25] Branko Urosevic -Rethinking Financial Talent: Integrating Cod...
by
DataScienceConferenc1
[DSC Europe 25] Miodrag Pesovic & Vladislav Radonjic - Federated Data Archite...
by
DataScienceConferenc1
Terminals into Throughways: Amtrak Through Service to Long Island
by
krv2009
Data analysis 2 presentation at ipmc.pptx
by
abdualimohammed960
Edison Research's Top 10 Findings of 2025
by
mlazovick
CRAFTING A PERSUASIVE STRATEGY PRESENTATION - ORLANDO LIZARRAGA.pptx
by
OrlandoLizarragaCerv
Deep Learning The Next Frontier (AI).pptx
by
waheedshahzad6
Data-Pre-Processing-and-Visualization-for-Machine-Learning.pptx
by
Muhammad Fahad Bashir
DiaryofaWebSDKImplemenation-LaunchDebugging.pdf
by
gmuir1066
[DSC Europe 25] Kaja Kandare - LLM as a judge.pptx
by
DataScienceConferenc1
McCrindle 2026 Trends of the Year
by
Mark McCrindle
A SURVEY ABOUT USING CRYPTOGRAPHIC ALGORITHM
1.
A SURVEY ABOUT
USING CRYPTOGRAPHIC ALGORITHMS FOR SECURING IOT DEVICES 1 Dr Kulvir Singh, 2 Prinka, 3 Prabhjot Kaur, 4 Poonam 1 Assistant Professor, 2,3,4 Student Malout Institute of Management and Technology, Malout Abstract Cryptographic algorithms are used to generate keys and provide security for IoT devices by leveraging unique physical characteristics of hardware as a root of trust. Common PUF-based cryptographic approaches involve symmetric key algorithms, such as hash functions and AES, to generate shared keys for authentication and encrypted communication between devices or with servers. The Internet of Things (IoT) is a system of interconnected materials that have software, detectors, and network integration embedded that make it possible to gather information and communicate. But as the number of connected devices grows rapidly, privacy and security concerns raised by the IoT have been the primary concerns. IoT devices are vulnerable to a range of security hazards, including malware attacks, unauthorised access, and data breaches, which may jeopardise the confidentiality, integrity, and accessibility of the data they collect and process. This paper aims to provide a brief overview of IoT security, which helps identify the most significant issues with IoT ecosystem security and safety. The survey focuses on the cryptographic techniques that are used to provide security to IoT devices and summarises the proposed Internet of Things safeguarding algorithms. Keywords- IoT, IoT security, Cryptographic algorithms, Lightweight cryptography. I. INTRODUCTION The iInternet iof iThings i(IoT) ihas iquickly ichanged ithe itechnology iindustry iand ican ichange imany iparts iof ieveryday ilife. iIoT idevices ihave isensors, isoftware, iand ithe iability ito iconnect ito ithe iinternet. iThese idevices ican icollect iand ishare iinformation ito ihelp imake ithings imore iefficient, iproductive, iand iconvenient. iIn iareas ilike imedicine, itelecommunications, idefense, ibusiness, iand iconsumer iproducts, iIoT iis ialready ibeing iused ia ilot. iIoT irefers ito ia iwide ivariety iof idevices ithat iare iconnected. iEach idevice ihas ia iunique iID iand iworks itogether iusing ithe iinternet ito imake idevices iand isystems ismarter iand imore iconnected. iIoT iservices igo ibeyond ijust imachines italking ito ieach iother i(M2M) iand iinclude imany idifferent itypes iof isystems, iareas, iand iuses. iThere iare ithree imain iparts ito iunderstand iIoT iproperly: ia. iDevices iwith isensors iand iactuators ithat ihave ia iunique iID, ib. iA iplace ito istore ithe iraw idata icollected ifrom ithese idevices, iand ic. iThe iability ito iprocess iand ianalyze ithe iinformation. iThese iconnected isensors isend iinformation iabout ithe imachines' istatus ito ieither ilocal istorage ior ito ithe icloud ithrough ithe iinternet. iThis iinformation iis ithen ilooked iat iand ianalyzed. iBased ion icertain irules, ithe iserver isends imessages iback ito ithe idevices iso ithey ican itake iaction iusing ithe iconnected iactuators. iFigure i1 ishows ihow ithese iIoT iparts iwork itogether. iIn itoday's iworld iwhere ia ilot iof idata iis ishared, iespecially ifrom imany isensors iin ithe iInternet iof iThings i(IoT), ikeeping ithe idata iprivate iand isafe iis ireally iimportant. iTo iprotect ithis idata iwhile iit's istored ior isent, ipeople iuse ispecial itechniques icalled icryptography. iThese itechniques iinclude iboth iasymmetric iand isymmetric ikey imethods, iand itheir iuses idepend ion itheir ifeatures. iAsymmetric icryptography iis iused ito ibuild itrust ibetween ipeople, isign imessages, iand icreate isecure iconnections. iIt ihelps iin isharing isymmetric ikeys ithrough imethods ilike ithe iDiffie-Hellman ischeme. iHowever, iit iis inot igood ifor iencrypting ilarge iamounts iof idata ibecause iit iuses imore itime, iresources, iand ilong ikeys ito ikeep idata isafe. iSymmetric icryptography iis ibetter iin imany iways. iIt iuses ishorter ikeys iand ineeds iless icomputer ipower, imaking iit ifaster iand imore iefficient. iFor iexample, iRSA, iwhich iis iasymmetric, ineeds ikeys ithat iare iat ileast i3072 ibits ilong, ibut iAES, iwhich iis isymmetric, iworks iwell iwith ijust i128 ibits. iSymmetric imethods ialso iwork iwell iwith istreaming idata ilike ivideos iand iaudio. iBut ithe imain iproblem iis isharing ithe ikey isecurely. iThis iis iwhere iasymmetric icryptography icomes iin ito ihelp iset iup ia isecure iconnection, iafter iwhich ithe isymmetric ikey, ioften icalled ia isession ikey, ican ibe isent. iCryptographic ikeys idon't ilast iforever. iThe iway ito icheck iif ia ikey iis istill igood ican ibe ibased ion ihow imuch idata iit ihas iencrypted ior ihow ilong iit ihas ibeen iused. iSometimes iboth imethods iare iused itogether. iNo imatter ithe imethod, ikeys ineed ito ibe ichanged. iThe iways ito irenew ikeys ivary. iOne imethod iis ito icreate ia inew ikey iusing ithe isame iprocess. iAnother iis ito iuse ithe iold ikey ito iget ithe inew ikey. iA ithird imethod iuses itwo ikeys, ione imain iand ione ifor irenewal. iThe iwhole iprocess iof iusing iand irenewing ikeys idepends ion itrust ibetween ithe iusers. iTo ibuild ithis itrust, ia ithird iparty, ilike ia iCertification iAuthority, iis ioften iused. iBut ithis ineeds ia ilot iof iresources ilike istorage ispace, ifast iinternet, istrong icomputers, iand ireliable ipower, iwhich imany iIoT idevices idon't ihave. iIn ia inetwork iof isensor inodes, iwhich ihave ivery ilimited iabilities, iclusters iare iformed ito ihandle icommunication. iSpecial isolutions iare ibeing imade ito ikeep idata isafe iwithin ithese iclusters. iGroup ikey imanagement i(GKM) iis ia imethod iused ito ishare ikeys iamong ia igroup iof iconnected inodes. iResearchers ihave istudied imany itypes iof iGKM isystems, ilooking iat idifferent inetworks ilike iwireless isensor inetworks, ibody iarea inetworks, icloud icomputing, iand iIoT. iThey ievaluated ifactors ilike ikey isharing, itypes iof
2.
ialgorithms, iscalability, iand
ihow isecure ithe isystems iare. iThere iis ia ineed ifor isecure idata iexchange ibetween iclusters iand iother iclosed isystems, ilike igovernment iinfrastructure, imilitary, ipolice, iand ihealth iservices. Figure i1: iIoT icomponent icommunication[1] In iemergencies ilike inatural idisasters, iterrorist iattacks, ior iwars, isecure icooperation ibetween icivilian iIoT iand imilitary isystems ibecomes ivery iimportant. iThis ipaper italks iabout ia isystem ifor igenerating, irenewing, iand idistributing isymmetric ikeys. iIt iis idesigned ifor iusers iwith ilimited imemory, icomputing ipower, iand ibattery ilife, ias iwell ias ifor ithose iwith imore iresources. iWhen ibuilding ithis isystem, ichanges iwere imade ito ithe idata istructures iand iencryption imethods, iand isoftware icalled iTPM iwas iused ias ia isecure icryptographic itool. iThese ichanges iincreased ithe inumber iof isteps iin ithe isystem iand ichanged ithe iflow iof isome iprocedures. II. THE IGENERAL ICONCEPT IOF ITHE IKEY IGENERATION, IRENEWAL, IAND IDISTRIBUTION I(KGRD) ISYSTEM The iIdea ibehind ithe iKGRD iSystem The inumber iof iIoT inetwork idevices iis igrowing iquickly. iAny iof ithese idevices ican ibe iattacked iby ihackers, ibut ithis ikind iof iattack iis inot ivery icommon. iHowever, ithese idevices ican isometimes ibe iused itogether iin ia igroup ito iattack iother itargets. iIn iboth icases, ithe imain ireason iis ithat iit's ireally ihard ito icreate igood iways ito iprotect ithese idevices ifrom iunwanted iaccess ito itheir iresources. iThese iIoT idevices iare ioften ismall iand imove iaround. iThey iuse iwireless iconnections ithat ihave ia ishort irange iand ilow ispeed. iThey ialso ihave ilimited icomputing ipower, inot imuch imemory, iand iuse ipower isources ithat iaren't ivery iefficient. iBecause iof ithese ilimits, iit's ivery idifficult ito imake istrong isecurity isystems ithat ican iprotect ithe idevices iand ikeep idata iexchanges isafe. iIn ithis isituation, ione icommon iway ito ideal iwith ithe iproblem iis ito igroup ithe idevices itogether iin iclusters. iSecurity imeasures iare iput iin iplace ito imake isure ithe idevices iin ithe igroup ican itrust ieach iother, iprotect itheir iprivate iinformation, iand ikeep ithe idata ithey ishare isafe. iAn iexample iof ithis iis ithe isecure iarea ifor isensor idevices imentioned iin i[6,7]. iThis imethod ihelps iprotect ithe igroup iof isensor idevices, ibut ithere's istill ia ibig ichallenge iwhen iit icomes ito isecurely isharing idata ibetween ithese igroups iand iregular icomputer isystems. III. COLLABORATION IBETWEEN ICLUSTERS IOF IIOT INODES IAND IOTHER IIT ISYSTEMS Cryptographic isolutions ithat iuse isymmetric ikey ialgorithms ican ihelp ikeep idata isafe iwhen iit's ishared ibetween igroups iof iIoT idevices. iThis imethod ihas ia ilot iof ibenefits, ibut iit ineeds ia iway ito isafely ishare ithe ikeys iused ifor iencryption. iThere iare ialready isystems iin iplace ifor ikey idistribution iin iregular iIT isystems, ibut ithere's ia ineed ifor ia isystem ithat iworks iwith iboth igroups iof iIoT idevices iand itraditional iIT isystems. iThis iis iwhere ithe iKGRD isystem icomes iin. iFigure i2 ishows ihow ithe iKGRD isystem iis istructured.[8] iIt iwas iassumed ithat iin ieach igroup iof iIoT idevices, ione idevice iwould iact ias ia imiddleman ifor isending iand ireceiving idata ibetween ithe idevices iand ithe ioutside iworld.In iFigure i2, ithis idevice iis icalled ia iGateway. iSimilarly, ispecial idevices ior isoftware iparts iin iIT isystems ithat iare iset iup ifor ithis ijob ialso itake ion ithe isame irole. iFor ithe iKGRD isystem, iGateway iparts iwill istand ifor ieither ian iIoT igroup ior ian iIT isystem. iFigure i3 ishows ia inew iversion iof ithe iKGRD isystem's istructure.[6]
3.
Figure i2: iIllustration
iof iIoT iclusters iand itraditional iinformation isystems’ icollaboration iwith ithe iKGRD isystem[1] Figure i3: iThe istructure iof ithe iKGRD isystem i i[2] IV. IOT ISECURITY ILAYERED IARCHITECTURE The igrowing iuse iof iIoT idevices iin idifferent iindustries ihas imade iit inecessary ito ihave istrong isecurity imeasures ito iprotect iagainst icyber ithreats. iCreating iand icarrying iout isecurity iplans, itechniques, iand iprocesses ithat iensure ithe iprivacy, icorrect iinformation, iand iavailability iof idata ishared ibetween iIoT idevices iis icalled iIoT isecurity iarchitecture. iThis iarchitecture ialso iincludes isecurity irules iand iprocedures ithat iguide ihow idevices iare iallowed ito iwork, iverified, iand ichecked, ias iwell ias ihow idata iis istored, ihandled, iand iaccessed. iGood iIoT isecurity iarchitecture iis iimportant ifor ikeeping ipeople iand ibusinesses isafe iand iprivate iwhen iusing iIoT idevices iand ifor imanaging ithe irisks ilinked ito ithese idevices iand itheir inetworks. Application iLayer i i In ithe isecurity isetup, ithe iapplication ilayer iis ithe ipart ithat imakes isure ithe iapps iand iservices irunning ion itop iof ithe iIoT isystem iare isecure. iThis ilayer iis iimportant ifor ikeeping ithe iIoT ienvironment isafe iand iprivate. iThis ilayer ihas idifferent isecurity isteps isuch ias iaccess icontrol, ichecking idata, iand icleaning iinput. iAccess icontrol istops ionly iapproved iusers ifrom iusing iapps iand iservices, iwhile ichecking idata iand icleaning iinput iensures ithat ionly icorrect iand isafe idata iis iprocessed iby ithe iapps iand iservices. iSecuring ithe iapplication ilayer iis iessential ifor iprotecting ithe iIoT isystem's ioverall isafety iand iprivacy. iBy imaking isure ithe iapps iand iservices ion itop iof ithe iIoT isystem iare isecure, igroups ican ihelp iprotect itheir iIoT isystems ifrom ipossible iDDoS iattacks iand ireduce ithe ichance iof idata ileaks. iCurrently, ithere iare ino iworldwide istandards ifor ithe iIoT iapplication ilayer. iSome icompanies iuse ia imode icalled iM2M i(Machine ito iMachine). iAntonio iet ial. i[6] icreated ia idesign ifor ismart ihome isecurity iat ithis ilayer. Network iLayer i i The inetwork ilayer iin iIoT isecurity iarchitecture iis ithe ipart ithat ihandles iencrypting idata isent ibetween iservers iand iIoT idevices. iThis ilayer imust imake isure ithe idata's isecurity, ireliability, iand iavailability iover ithe inetwork iare iall iprotected. iThe inetwork ilayer iuses ivarious isecurity isteps, iincluding iencryption, iverification, iand iaccess icontrol. iEncryption imakes idata isafe iduring itransfer iby icoding iit iso ithat ionly itrusted iparties ican iread iit. iWith imany
4.
idifferent idevices iand
iprotocols icommunicating ion ithe inetwork, iit's ihard ito iensure iall itools iare iproperly isecured iand ithat idata iis isent isafely. iTo ideal iwith ithese iissues, iIoT isecurity ispecialists ihave icreated ibest ipractices ifor isecuring ithis ilayer. iThese iinclude iusing isecure imethods ifor icommunication iand iusing ifirewalls iand isystems ithat idetect iintrusions ito iwatch inetwork itraffic iand ispot ipossible idangers. iA isecure inetwork ilayer iis ivital ifor ithe ioverall isafety iof ithe iinternet. iThis ilayer imust iprevent ilarge iattacks ithat ican idamage idevice icoordination iand iinformation isharing i[5]. Physical iLayer/Perception iLayer i i The iperception ilayer iin iIoT isecurity iarchitecture iis ithe ifirst ilevel iof iprotection iand iis iresponsible ifor isecuring ithe iactual idevices ithat imake iup ithe iIoT isystem. i iThis ilayer iis ialso iknown ias ithe idevice ilayer iand iincludes isteps ilike isecure iboot, ifirmware iupdates, iand idevice iauthentication. iThe iperception ilayer iis iimportant ifor ikeeping ithe isafety iof iIoT idevices ibecause iit iis ithe ifirst iline iof idefense iagainst icyber ithreats. iThis ilayer iensures ithat ithe ireal idevices iand itheir isoftware iare iprotected ifrom iunauthorized iaccess, imalware, iand iother ithreats. iThe idevices iin ithe idevice ilayer iinclude isensors, ibuttons, igateways, iand iother igadgets ithat iinteract iwith ithe ireal iworld i[3]. iSecure iprotection iat ithis ilayer iincludes iusing ihardware-based isecurity isteps, isuch ias isecure iboot iand itrusted iexecution ienvironments, iand iusing isafe isoftware idevelopment imethods ilike iregular ifirmware iupdates iand imanaging ivulnerabilities. iA isecure iperception ilayer iis iimportant ifor ithe ioverall isafety iof ithe iIoT isystem. iBy ikeeping ithe iactual idevices isecure, iorganizations ican ihelp ireduce ithe irisk iof icyber ithreats iand iprotect itheir iIoT isystems ifrom ipossible isecurity iissues. iThe imain itechnologies iin ithis isection iare iradio ifrequency iidentification iand iwireless isensor inetworks i[4]. Figure i4: iThree-layered iIoT iSecurity iArchitecture i i Figure i4 ishows ithe ithree ilayers iof ithe iIoT isecurity istructure. iTo iprotect idata iprivacy iand ikeep iinformation iaccurate, iand ito ihandle ithe idifferent isecurity ichallenges ithat icome iwith ithe iInternet iof iThings, ia icarefully idesigned ithree-layered isecurity isystem iis ineeded. V. CRYPTOGRAPHIC IALGORITHMS IIN IIOT ISECURITY iTo ikeep ithe iIoT ienvironment isafe, icryptography iis ivery iimportant. iIt ihelps imake isure ithat ithe iinformation isent ithrough inetworks istays isecure iby iprotecting iconfidentiality, iintegrity, iand iavailability. iIn iinternet isecurity, icryptographic ialgorithms iare iused ito ihide idata iso ithat ionly iallowed ipeople ican isee iit, icheck ithat idata ihasn't ibeen ichanged iduring isending, iand iconfirm ithe iidentity iof ithe isender ior ireceiver. iCryptography iis ithe iprocess iof ikeeping iinformation isafe ias iit itravels iacross ia inetwork iby iusing iencryption itechniques. iTo iprotect inetworks, idifferent iencryption imethods iare iused. iThe ithree imain itypes iare isymmetric ialgorithms, iasymmetric ialgorithms, iand icryptographic iprotocols. iSymmetric ialgorithms iuse ione ikey ito iboth iencrypt iand idecrypt idata, iwhile iasymmetric ialgorithms iuse itwo idifferent ikeys ia ipublic ikey ifor iencryption iand ia iprivate ikey ifor idecryption. iThese imethods iare idifferent ibecause ithey iuse ia idifferent inumber iof ikeys. iSince ithese imethods iare iimportant ifor iprotecting iinformation isystems, ithey itake iup ia ilot iof imemory, iCPU itime, iand ibattery ilife. iThe isize iof ithe ikey iused iin isymmetric iencryption iaffects ihow isecure iit iis. iFor iexample, iRC2 iand iDES iuse ia i64-bit ikey, iwhile i3DES iuses itwo i64-bit ikeys. iAES iand iRC6 ican iuse ikeys iof i128, i192, ior i256 ibits, iand iBlowfish ican iuse ikeys ibetween i32 iand i448 ibits iwith i128 ibits ias ithe idefault i[7]. iCryptography iprovides ia ibasic ilevel iof isecurity ifor idata iand isafe iservices. iTherefore, ithe idesign iof icryptographic ialgorithms iand itheir irelated itechnology ifunctions iare iimportant ithings ito iconsider i[9]. A.SYMMETRIC IKEY IENCRYPTION I One iimportant itype iof iencryption iis icalled isymmetric ikey iencryption. iIn ithis imethod, ithe isame ikey iis iused iboth ito iencrypt iand idecrypt idata. iThis imeans ithe isender iand ireceiver iboth iuse ithe isame isecret ikey ito iprotect ithe iinformation ibeing isent. iTo iencrypt, ithe ioriginal idata, ior iplaintext, iis ipassed ithrough ia imathematical iprocess iusing ithe isecret ikey, iwhich iturns iit iinto isomething ithat ilooks ilike irandom icharacters, icalled iciphertext. iThis iciphertext iis ithen isent ito ithe ireceiver. iThe ireceiver iuses ithe isame isecret ikey ito ichange ithe iciphertext iback iinto ithe ioriginal iplaintext. iIf isomeone ielse igets ihold iof ithe ikey, ithey ican ialso iread ithe imessage. iSymmetric ikey
5.
iencryption iis ioften
iused iin iIoT isecurity ito ikeep idata isafe ias iit imoves ibetween idevices iin ia inetwork. iIt's iusually ipaired iwith iother isecurity itechniques, ilike ielectronic isignatures ior ihash ifunctions, ito iadd imore iprotection iand iensure ithe idata iis iprivate, ireliable, iand iaccurate. iSome icommon iexamples iof isymmetric ikey iencryption iinclude iAES i(Advanced iEncryption iStandard), iDES i(Data iEncryption iStandard), iand iTDEA i(Triple iData iEncryption iAlgorithm). iThese idifferent ialgorithms iuse ivarying ikey isizes iand imath ioperations ito isecurely iencrypt iand idecrypt idata. B.ASYMMETRIC IKEY IENCRYPTION I Public-key iencryption, ialso icalled iasymmetric ikey iencryption, iis ia isecurity imethod ithat iuses itwo idifferent ikeys ito iencode iand idecode idata. iThese ikeys iare imathematically iconnected ibut inot ithe isame, iwhich iis idifferent ifrom isymmetric ikey iencryption. iA iuser icreates ia ipair iof ikeys: ia iprivate ikey iand ia ipublic ikey. iAnyone ican iuse ithe ipublic ikey ito iencrypt idata iand isend iit ito ithe iuser, iand ithis ikey ican ibe ishared ifreely. iHowever, ithe iprivate ikey iis ikept isecret iby ithe iuser iand iis iused ito idecrypt idata ithat iwas iencrypted iwith ithe ipublic ikey. iOne imain iadvantage iof iasymmetric ikey iencryption iis ithat iit idoesn’t irequire ia isecure iway ito ishare ithe ikey, iwhich iis ia ibig iissue iwith isymmetric ikey iencryption. iBut iasymmetric iencryption iis iusually islower iand ineeds imore icomputer ipower ithan isymmetric iencryption. iIt iis ialso imore icomplicated iand irequires imore iprocessing ito iwork iproperly. iOften, iit iis iused itogether iwith iother isecurity imethods ito iprovide iextra iprotection iand iensure ithat idata istays iprivate, iis iaccurate, iand icomes ifrom ia ireal isource. iThese imethods iinclude isymmetric iencryption, ihash ifunctions, iand idigital isignatures. iExamples iof ialgorithms iused iin iasymmetric iencryption iare iRivest-Shamir-Adleman, ielliptic icurve icryptography, iand ithe iDiffie-Hellman ikey iexchange. iThese ialgorithms iuse idifferent imath ioperations iand ikey isizes ito iencrypt iand idecrypt iinformation. VI. RELATED IWORK I This ipaper igives ia ishort isummary iof ithe iwork ithat ihas ibeen idone iin ithe iarea iof iIoT isecurity, iespecially ilooking iat ihow icryptographic ialgorithms iare iused ito iprotect iIoT idevices. iRoy iet ial. i[8] icreated ia isimple icryptographic imethod ibased ion icellular iautomata i(CA). iThis imethod iis iused ito iprotect iinformation iat ithe iperception ilayer, iwhich iworks ibetter ithan isome iexisting iciphers ilike iDES iand i3DES. iNIST ihas iconfirmed ithat ithis imethod ipasses irandomness itests. iIt ialso ipasses iall idiehard itests, ishowing ithat iit ihas istrong isecurity ifeatures. Jassim iet ial. i[9] iintroduced ia ischeme ifor ilightweight istream iciphers ito iprovide istrong iencryption. i iThe idynamic ikey-dependent imethod ihelps iachieve ithis ilevel iof isecurity. iThe isystem iincludes ionly ia ifew ibasic icost-saving isteps. iIt imakes iuse iof ichanging icryptographic ibasics ifor ievery iinput iblock. iThe iencryption iis iefficient iand istrong, imaking iit igood ifor iIoT idevices iwith ilimited iresources. iThe isystem iuses ia inonce iand isecret ikey iof i128, i192, iand i256 ibits. iIt ihas i12 ito i14 irounds iand icombines iCR4, ia ipseudo-random inumber igenerator i(PRNG), iand ia ilinear ifeedback ishift iregister i(LFSR). iThis imethod ihas ihigh iperiodicity, ilow ienergy iuse, iand iis iresistant ito istatistical, ialgebraic, iand ibrute-force iattacks. iHowever, iit iis inot istrong ienough iagainst idisclosure iand idesynchronization iattacks. M.A. iKhan iet ial. i[10] isuggested iImproved iElliptical iCurve iCryptography ias ia igood iway ito iprotect iand iverify idata ifrom iIoT-based imedical isensors. i iThis isystem iuses ia ispecial ipoint igenerated ifrom iprime inumbers. iIt icombines iuser idetails iwith ibiometrics. iCreating ia inew isecret ikey iincreases inetwork isecurity icompared ito istandard iECC. iA icommon ikey iis iused ito iprotect idata, iwhile ia iprivate ikey iis iused ito idecrypt iit. iThe ielliptic icurve, ithe ipublic ikey, iand ithe iprivate ikey iall ihelp iform ithe isecret ikey. iThis isystem ihas ilow isecurity ineeds, islow iencryption iand idecryption ispeeds, iand iminimal icommunication ioverheads. iThe iusual iencryption iand idecryption itimes ifor iIECC iare i1.032 iand i1.004 iseconds, iwhich iare ibetter ithan iECC iand iRSA. iStatistical ianalysis ialso ishows ithat ithis imethod iworks iwell. Ghaffari iet ial. i[11] iintroduced inew ihybrid icryptographic ialgorithms, iSHA-256, iRC4, iand iECC, iwhich iare iused ifor isecurity iin iIoT-related iirrigation isystems. i iSHA-256 imainly icreates iencrypted idata. iThey ishowed ithe isecurity iproblems iof iIoT-based iirrigation isystems iusing ithese ialgorithms. iThey ialso isaid ithat ithe isuggested iapproach iwill ibe itested iand iimproved iin ifuture iwork ito ifit ireal-world iirrigation isystems. iCao iet ial. i[12] ideveloped ia isafe, ismall, imulti-sensor iD2D icommunication isystem. iTheir isystem iis ibased ion ikeys icreated iusing ilightweight imethods. iThis isharing imethod iuses ia imotion isensor ito isecure inear-field iidentification. iIt iuses ia idevice's imicrophone iand ispeaker ias idetectors iand ihelps iwith idata iexchange, ialong iwith iaudio iand iRF iencryption iand idecryption iprocesses. i iNao iet ial. i[13] istudied ithree iIoT isecurity ialgorithms: isymmetric, iasymmetric, iand ihybrid iencryption. iAll ithe ialgorithms iwere icompared ibased ion isecurity ifactors. iAccording ito ithe istudy's iresults, iECC i(Elliptic iCurve iCryptography) iworks ithe ibest iamong iall ithe imethods. iThe iauthors ileft ithe ipossibility iopen iof ireducing iintrusion iinto iIoT idevices iby iusing iasymmetrical itechniques ito ihelp iwith ithe igrowing ineeds iof icryptography. Memon iet ial. i[14] iproposed ia ifast iand isimple iauthentication imethod ibased ion ithe ipublic ikey ielliptic icurve idiscrete ilogarithm iproblem, iwhich iis ipart iof iElGamal iencryption. iThe ipaper iprovides ia ipublic ikey iinfrastructure- based iauthorization isystem ithat iencrypts ithe iprivate ikey iusing iElGamal iand iuses iECC ito iselect ikey ipairs. iMeshram iet ial. i[15] iproposed ian ieffective iand istrong iauthentication iprotocol ifor iIoT-based ismart icities. iThis iprotocol isupports isafe iresource imanagement iand icommunication. iIt iuses iwide ichaotic imaps ito iincrease isecurity
6.
iand ireduce idifferent
itypes iof iattacks. iIts ireliability iand iperformance ifor ismart icard-based ipassword iauthentication iare iconfirmed iusing iBAN ilogic iverification. Runa iet ial. i[16] iproposed ia imethod ifor ia ilightweight icryptographic ialgorithm icalled iPresent, iwhich ihas ibeen ialtered. i iThe irecommended imethod iuses ia ismall iamount iof iinformation ifrom ithe iTEA ilightweight icipher. iIt iwas isuccessfully idesigned ifor ithe iDelphi iC++ iplatform. iThe iviability iof ithe imodified iPRESENT iencryption icompared ito ithe ioriginal iPRESENT icipher iwas iproven iusing isoftware iparameter ianalysis iwith iCryptool. iFor iall iinput ifile itypes, ithe isuggested imethod's inon-homogeneity itest igives ithe iideal ichi-square ivalue. iThe iN-gram itest, iwhich ichecks ithe iperiodicity iof icharacters iin iciphertext, iconsistently igives imuch ilower iresults ithan ithe icurrent icipher. iAn iefficient igraph ifor ithe imodified iPRESENT iis ialso icreated iusing ithe ifloating ifrequency itest iand ihistogram. iThe iresults ifrom idifferent itests ishow ithat ithe imodified iPRESENT iapproach iis imore ieffective ithan ithe ioriginal imethod. iTaloba iet ial. i[17] iproposed ia iblockchain-based iframework ifor isecure ihealthcare. i iBlockchain iis iused ito iensure idocument iavailability, iprotect imedical idata, iand iensure itransparency iin ithe ishipping iprocess ibetween isuppliers iand iclients. Rahul iSaha iet ial. i[20] iproposed ia ibilinear imap ischeme isolution ifor iIoT isecurity. i iThey iused iaggregate isigning ito iimprove inetwork iperformance iand iincluded itime istamps iin ithe ikey igeneration iprocess. iThe iproposed isolution iis iintended ifor iuse iin ithe ifog ilayer iof ithe iIoT iinfrastructure. iThe iresults iwere icompared iwith iother iexisting ischemes iand ishowed ithat ithe iproposed ischeme iis iefficient ifor iIoT iapplications. iTarandeep iSingh iet ial. i[21] iproposed ia inew icryptography iand isteganography imodel ithat iuses ilow-complexity ielliptic iGalois icryptography i(EGCrypto) ifor iIoT isecurity.They iused imatrix iXOR isteganography ialong iwith iEGCrypto. iThe iextensive iexperiments ishowed ithat iEGCrypto iperforms ibetter ithan iother imodels iin ivarious imetrics. iFuture iwork ion ithis iwill ifocus ion iimproving iEGCrypto's iefficiency iand isecurity iagainst iadvanced iattacks iin iIoT isecurity. iReji iThomas iet ial. i[22] iproposed ian iauthentication iprotocol ifor iIoT isecurity ibased ion iLiSP isigncryption. i iThey iused itwo ilightweight icryptographic imodules iwith iefficient iproperties. iThe iexperiment iresults ishowed ithat iLiSP-XK iis i35% imore iefficient ithan iother iencryption iapproaches. iThe iremaining iwork iby ithe iauthors iis ifocused ion ia idistributed ikey igeneration imechanism. VII. CONCLUSION iIoT idevices iplay ia ibig irole iin ihow iwe ilive, ibut ithey ialso ibring isome isafety iissues ithat ineed ito ibe ithought iabout. iUsing isafe iways ito iinteract, iverify iwho iis iallowed ito iaccess, iand iprotect idata ican igreatly iimprove ithe isecurity iof iIoT isystems. iIt's iimportant ito iuse icryptographic imethods ito isecure iIoT idevices iand ithe inetworks ithey iare iconnected ito. iCryptography ihelps iprotect iimportant iinformation iand ithe icommunication ibetween idevices iin ian iIoT isetup. iIt ican istop ipeople ifrom igetting iinto isystems iwithout ipermission, ichanging idata, ior istealing iinformation. iIt ialso imakes iit ipossible ifor iIoT idevices ito ishare iimportant idetails isafely iwithout iletting ihackers isee ithem. iNot iall icryptographic isystems iare ithe isame, iand isome iare ibetter ifor iIoT idevices ithan iothers. iTo imake isure isecurity isolutions iwork iwell ifor idevices ithat ihave ilimited iresources, iit's iimportant ito icarefully icheck ithe icryptographic ialgorithms iand iprotocols ithey iuse. iAs itechnology iimproves, icryptography iwill ihelp imake iIoT isystems imore isecure iand iprivate. iBut iit's iimportant ito icarefully ichoose ithe iright icryptographic itechniques ifor ieach isituation. iAI iand icryptography itogether ican ihelp icreate ia istrong iand iactive idefense iagainst inew ithreats iin iIoT ienvironments. iFeatures ilike iAI-powered ithreat idetection, isecurity ithat ican ichange iand iimprove, iwatching ihow iusers ibehave, iautomatic iresponses, ipredicting ipossible ithreats, ibetter idata iencryption, istronger iauthentication, iself- managing isecurity, iand ibetter iprivacy iprotection iare iall ipossible. iOur ireview ipaper igives ian ioverview iof ithe icryptographic ialgorithms ithat iare ialready ibeing iused ito isecure iIoT idevices. References i [1].Hossein iMotlagh, iN., iMohammadrezaei, iM., iHunt, iJ., i& iZakeri, iB. i(2020). iInternet iof iThings i(IoT) iand ithe ienergy isector. iEnergies, i13(2), i494. [2]. Urbano, iO., iPerles, iA., iPedraza, iC., iRubio-Arraez, iS., iCastelló, iM. iL., iOrtola, iM. iD., i& iMercado, iR. i(2020). iCost- effective iimplementation iof ia itemperature itraceability isystem ibased ion ismart iRFID itags iand iIoT iservices. iSensors, i20(4), i1163. [3]. Khattak, iH. iA., iShah, iM. iA., iKhan, iS., iAli, iI., i& iImran, iM. i(2019). iPerception ilayer isecurity iin iInternet iof iThings. iFuture iGeneration iComputer iSystems, i100, i144-164. [4]. Kanj, iM., iSavaux, iV., i& iLe iGuen, iM. i(2020). iA itutorial ion iNB-IoT iphysical ilayer idesign. iIEEE iCommunications iSurveys i& iTutorials, i22(4), i2408-2446. i [5]. Özalp, iA. iN., iAlbayrak, iZ., iÇakmak, iM., i& iÖzdoĞan, iE. i(2022, iJune). iLayer-based iexamination iof icyber-attacks iin iIoT. iIn i2022 iInternational iCongress ion iHuman-Computer iInteraction, iOptimization iand iRobotic iApplications i(HORA) i(pp. i1-10). iIEEE. [6]. Almaraz-Rivera, iJ. iG., iPerez-Diaz, iJ. iA., i& iCantoral-Ceballos, iJ. iA. i(2022). iTransport iand iapplication ilayer iDDoS iattacks idetection ito iIoT idevices iby iusing imachine ilearning iand ideep ilearning imodels. iSensors, i22(9), i3367. [7]. Thakor, iV. iA., iRazzaque, iM. iA., i& iKhandaker, iM. iR. i(2021). iLightweight icryptography ialgorithms ifor iresource- constrained iIoT idevices: iA ireview, icomparison iand iresearch iopportunities. iIEEE iaccess, i9, i28177-28193.
7.
[8]. Roy, iS.,
iRawat, iU., i& iKarjee, iJ. i(2019). iA ilightweight icellular iautomata ibased iencryption itechnique ifor iIoT iapplications. iIEEE iAccess, i7, i39782-39793. i [9]. Jassim, iS. iA., i& iFarhan, iA. iK. i(2021, iApril). iA isurvey ion istream iciphers ifor iconstrained ienvironments. iIn i2021 i1st iBabylon iInternational iConference ion iInformation iTechnology iand iScience i(BICITS) i(pp. i228-233). iIEEE. [10].Khan, iM. iA., iQuasim, iM. iT., iAlghamdi, iN. iS., i& iKhan, iM. iY. i(2020). iA isecure iframework ifor iauthentication iand iencryption iusing iimproved iECC ifor iIoT-based imedical isensor idata. iIEEe iAccess, i8, i52018-52027. [11]. Mousavi, iS. iK., iGhaffari, iA., iBesharat, iS., i& iAfshari, iH. i(2021). iImproving ithe isecurity iof iinternet iof ithings iusing icryptographic ialgorithms: ia icase iof ismart iirrigation isystems. iJournal iof iAmbient iIntelligence iand iHumanized iComputing, i12(2), i2033-2051. [12].Cao, iM., iWang, iL., iXu, iH., iChen, iD., iLou, iC., iZhang, iN., i... i& iQin, iZ. i(2019). iSec-D2D: iA isecure iand ilightweight iD2D icommunication isystem iwith imultiple isensors. iIEEE iAccess, i7, i33759-33770. i [13].Duan, iX., iGuo, iD., iLiu, iN., iLi, iB., iGou, iM., i& iQin, iC. i(2020). iA inew ihigh icapacity iimage isteganography imethod icombined iwith iimage ielliptic icurve icryptography iand ideep ineural inetwork. iIEEE iAccess, i8, i25777-25788. [14].Abro, iA., iDeng, iZ., i& iMemon, iK. iA. i(2019). iA ilightweight ielliptic-Elgamal-based iauthentication ischeme ifor isecure idevice-to-device icommunication. iFuture iInternet, i11(5), i108. [15].Meshram, iC., iIbrahim, iR. iW., iDeng, iL., iShende, iS. iW., iMeshram, iS. iG., i& iBarve, iS. iK. i(2021). iA irobust ismart icard iand iremote iuser ipassword-based iauthentication iprotocol iusing iextended ichaotic imaps iunder ismart icities ienvironment. iSoft iComputing, i25(15), i10037-10051. [16].Chatterjee, iR., i& iChakraborty, iR. i(2020, iMarch). iA imodified ilightweight iPRESENT icipher ifor iIoT isecurity. iIn i2020 iInternational iconference ion icomputer iscience, iengineering iand iapplications i(ICCSEA) i(pp. i1-6). iIEEE. i [17].Taloba, iA. iI., iElhadad, iA., iRayan, iA., iAbd iEl-Aziz, iR. iM., iSalem, iM., iAlzahrani, iA. iA., i... i& iPark, iC. i(2023). iA iblockchain-based ihybrid iplatform ifor imultimedia idata iprocessing iin iIoT-Healthcare. iAlexandria iEngineering iJournal, i65, i263-274. [18].Sridhar, iG., iReddy, iC. iS. iP., iSagar iReddy, iM. iL. iS., iSudheer, iK., iTulla, iS. iH., i& iAtaullah, iM. i(2022). iEdge iComputing iBased iTrustworthy iData iCollection iby iUsing iCryptography iTechnique ifrom iIOT. iInternational iJournal iof iEarly iChildhood iSpecial iEducation, i14(3). i [19].Saha, iR., iGeetha, iG., iKumar, iG., iKim, iT. iH., i& iBuchanan, iW. iJ. i(2019). iMRC4: iA imodified iRC4 ialgorithm iusing isymmetric irandom ifunction igenerator ifor iimproved icryptographic ifeatures. iIEEE iAccess, i7, i172045-172054. [20]. Kim, iT. iH., iKumar, iG., iSaha, iR., iAlazab, iM., iBuchanan, iW. iJ., iRai, iM. iK., i... i& iThomas, iR. i(2020). iCASCF: iCertificateless iaggregated isigncryption iframework ifor iinternet-of-things iinfrastructure. iIEEE iAccess, i8, i94748-94756. [21].Kaur, iM., iAlzubi, iA. iA., iWalia, iT. iS., iYadav, iV., iKumar, iN., iSingh, iD., i& iLee, iH. iN. i(2023). iEGCrypto: iA ilow- complexity ielliptic igalois icryptography imodel ifor isecure idata itransmission iin iIoT. iIEEE iAccess, i11, i90739-90748. [22]. Kim, iT. iH., iKumar, iG., iSaha, iR., iBuchanan, iW. iJ., iDevgun, iT., i& iThomas, iR. i(2021). iLiSP-XK: iextended ilight- weight isigncryption ifor iIoT iin iresource-constrained ienvironments. iIEEE iAccess, i9, i100972-100980.
Download