scholarly journals An investigation on cryptographic algorithms usage in IoT contexts

2018 ◽  
Vol 7 (1.7) ◽  
pp. 10
Author(s):  
R H Aswathy ◽  
N Malarvizhi

The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.

Author(s):  
Samed Bajrić

The underlying vision of the internet of things (IoT) is to create a world where the real and the virtual realms are converging to create smart environments that makes energy, transport, cities, and many other areas more intelligent. With the IoT, the physical world is being interfaced through the things to the virtual world in heterogeneous environment. In heterogeneous environment, privacy and security are the major challenges. The secure information exchange is most critical pitfall to ensure the system security. This chapter gives a detailed analysis of cryptographic algorithms in IoT. A comparison of lightweight cryptography algorithms on basis of block size, key size, gate equivalents, and throughput is given. Moreover, the various security issues in IoT are discussed along with possible solution.


Author(s):  
Samed Bajrić

The underlying vision of the internet of things (IoT) is to create a world where the real and the virtual realms are converging to create smart environments that makes energy, transport, cities, and many other areas more intelligent. With the IoT, the physical world is being interfaced through the things to the virtual world in heterogeneous environment. In heterogeneous environment, privacy and security are the major challenges. The secure information exchange is most critical pitfall to ensure the system security. This chapter gives a detailed analysis of cryptographic algorithms in IoT. A comparison of lightweight cryptography algorithms on basis of block size, key size, gate equivalents, and throughput is given. Moreover, the various security issues in IoT are discussed along with possible solution.


2020 ◽  
Vol 13 (3) ◽  
pp. 435-445 ◽  
Author(s):  
Malik Qasaimeh ◽  
Raad S. Al-Qassas ◽  
Fida Mohammad ◽  
Shadi Aljawarneh

Background: Lightweight cryptographic algorithms have been the focus of many researchers in the past few years. This has been inspired by the potential developments of lightweight constrained devices and their applications. These algorithms are intended to overcome the limitations of traditional cryptographic algorithms in terms of exaction time, complex computation and energy requirements. Methods: This paper proposes LAES, a lightweight and simplified cryptographic algorithm for constricted environments. It operates on GF(24), with a block size of 64 bits and a key size of 80-bit. While this simplified AES algorithm is impressive in terms of processing time and randomness levels. The fundamental architecture of LAES is expounded using mathematical proofs to compare and contrast it with a variant lightweight algorithm, PRESENT, in terms of efficiency and randomness level. Results: Three metrics were used for evaluating LAES according to the NIST cryptographic applications statistical test suite. The testing indicated competitive processing time and randomness level of LAES compared to PRESENT. Conclusion: The study demonstrates that LAES achieves comparable results to PRESENT in terms of randomness levels and generally outperform PRESENT in terms of processing time.


OP-Journal ◽  
2021 ◽  
Author(s):  
Genevieve Westacott ◽  
Kirsten Vallmurr ◽  
Michael Schütz

AbstractData transfer has been forced to evolve as digital technologies are implemented throughout various aspects of the healthcare system. Despite the uniqueness of both the geography and the population of Queensland, information exchange and data communication has continued to follow this evolutionary trend. There have been a number of different health reforms designed to integrate digital innovations and allow critical data and information to be shared with the appropriate health professionals when necessary. Strict healthcare legislation has been navigated and to provide newly upgraded technologies and processes while maintaining privacy, confidentiality and security standards. A large portion of the digital revolution has been the implementation of the national run project, the My Health Record and the state run project, the Integrated Electronic Medical Record. Both are platforms that allow secure information exchange allowing patients to have improved quality of care. To maintain the steady progress, both the state and federal governments have developed strategies and visions to help provide guidance and direct for ongoing and future digital projects. They also outline areas that require further advancements to ensure Queensland is delivering equitable, high quality healthcare.


2011 ◽  
Vol 14 (06) ◽  
pp. 905-949 ◽  
Author(s):  
REGINALD D. SMITH

The Internet is one of the largest and most complex communication and information exchange networks ever created. Therefore, its dynamics and traffic unsurprisingly take on a rich variety of complex dynamics, self-organization, and other phenomena that have been researched for years. This paper is a review of the complex dynamics of Internet traffic. Departing from normal treatises, we will take a view from both the network engineering and physics perspectives showing the strengths and weaknesses as well as insights of both. In addition, many less covered phenomena such as traffic oscillations, BGP storms, and comparisons of the Internet and biological models will be covered.


2020 ◽  
Vol 31 (1) ◽  
pp. 41
Author(s):  
Ansam Sabah Bader ◽  
Shaymaa Hameed ◽  
Maisa’a Abid Ali K.

Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication,  data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not. The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of cryptographic algorithms. The base of this proposal is to investigate a new method for generating random numbers by using the 3D Lorenz system and 2D Henon map. The newly generated keys have successfully passed the National Institute of Standards and Technology (NIST) statistical test suite


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Author(s):  
Adi V. Gundlapalli ◽  
Jonathan H. Reid ◽  
Jan Root ◽  
Wu Xu

A fundamental premise of continuity in patient care and safety suggests timely sharing of health information among different providers at the point of care and after the visit. In most healthcare systems, this is achieved through exchange of written medical information, phone calls and conversations. In an ideal world, this exchange of health information between disparate providers, healthcare systems, laboratories, pharmacies and payers would be achieved electronically and seamlessly. The potential benefits of electronic health exchange are improved patient care, increased efficiency of the healthcare system and decreased costs. The reality is that health information is electronically exchanged only to a limited extent within local communities and regions, much less nationally and internationally. One main challenge has been the inability of health information exchange organizations to develop a solid business case. Other challenges have been socio-political in that data ownership and stewardship have not been clearly resolved. Technological improvements over the past 20 years have provided significant advances towards safe and secure information exchange. This chapter provides a general overview of community health information exchange in the United States of America, its history and details of challenges faced by stakeholders. The lessons learned from successes and failures, research and knowledge gaps and future prospects are also discussed. Current and future technologies to facilitate and invigorate health information exchange are highlighted. Two examples of successful regional health information exchanges in the US states of Utah and Indiana are highlighted.


2007 ◽  
Vol 06 (05) ◽  
pp. 373-377 ◽  
Author(s):  
V. KISLOV ◽  
B. MEDVEDEV ◽  
YU. GULYAEV ◽  
I. TARANOV ◽  
V. KASHIN ◽  
...  

We report on a number of new effects of self-organization at nanoscale, leading to creation of new functional nanomaterials, including carbon and carbon–metal nanotoroids and nanodiscs and self-assembling of magnetic nanoparticles into helices and chains. We also extensively used a new approach of biopattern nanoengineering to create DNA-based complexes with metal or CdSe / ZnS core-shell nanorods (22 × 4.5 nm) which possess strong linearly polarized photoluminescence due to unidirectional orientation of nanorods along DNA filaments. Optical, electrical, and topological (geometrical) properties of such complexes were investigated. This work is a result of a coherent effort (since 1980s) of a consortium of Russian research groups in Nano-technology (INTC: Interdisciplinary Nanotechnology Consortium) aimed at creating molecular electronic devices based on individual and collective properties of specially designed and fabricated nanoclusters.


Sign in / Sign up

Export Citation Format

Share Document