A Review of Cryptographic Algorithms for the Internet of Things

Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.

Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2013 ◽  
Vol 278-280 ◽  
pp. 2012-2015
Author(s):  
Lian Shi Lin ◽  
Qing Hu ◽  
Yu Ping Qui

The Internet of things is a massive electronic equipment with internet interconnection of large scale virtual networks, including RFID, sensor and actuator electronic devices by the internet interconnection. In order to solve internet of things architecture intelligent refrigerator key technologies, The paper had discussed the internet of things architecture intelligent refrigerator definition, characteristic as well as reference architecture, focused on analysis intelligent refrigerator information space definition, information quantification method and mobile platform equipment internet of things key technology main problems and corresponding solution ways.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Huani Chen ◽  
Jian Huang

Nowadays, due to the pandemic and other problems, the establishment of physical classes is a big headache for both students and teachers, due to which the education system all over the world is shifted to the online system from the physical system. Advance technologies such as the Internet of Things (IoT) are playing a significant part in various sectors of life such as health, business, and education. In order to effectively improve the effect of online English teaching, this study designed an interactive online English teaching system based on the IoT technology. This study proposes three topological structures for the establishment of the proposed IoT-based online English teaching system. Based on the analysis of the three topological structures of the IoT, this study chooses to design each submodule of the front and back of the system in the network IoT environment to realize the daily operation and various functions of the system and to realize the interactive design of both of the teacher and student side. Based on this approach, an online English teaching system is designed, and the teaching quality based on this system is evaluated with the help of an algorithm known as grey relational analysis algorithm. The experimental results show that, after the application of this system, students have access to the teaching materials and content in a short period of time; and the English test scores were improved and were significantly higher as compared to the traditional teaching system. In addition, at the same time, the internal consistency reliability of the proposed system is very high which fully demonstrates the effectiveness of the proposed system.


Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


Sign in / Sign up

Export Citation Format

Share Document