An Analysis of Cryptographic Algorithms in IoT

Author(s):  
Samed Bajrić

The underlying vision of the internet of things (IoT) is to create a world where the real and the virtual realms are converging to create smart environments that makes energy, transport, cities, and many other areas more intelligent. With the IoT, the physical world is being interfaced through the things to the virtual world in heterogeneous environment. In heterogeneous environment, privacy and security are the major challenges. The secure information exchange is most critical pitfall to ensure the system security. This chapter gives a detailed analysis of cryptographic algorithms in IoT. A comparison of lightweight cryptography algorithms on basis of block size, key size, gate equivalents, and throughput is given. Moreover, the various security issues in IoT are discussed along with possible solution.

Author(s):  
Samed Bajrić

The underlying vision of the internet of things (IoT) is to create a world where the real and the virtual realms are converging to create smart environments that makes energy, transport, cities, and many other areas more intelligent. With the IoT, the physical world is being interfaced through the things to the virtual world in heterogeneous environment. In heterogeneous environment, privacy and security are the major challenges. The secure information exchange is most critical pitfall to ensure the system security. This chapter gives a detailed analysis of cryptographic algorithms in IoT. A comparison of lightweight cryptography algorithms on basis of block size, key size, gate equivalents, and throughput is given. Moreover, the various security issues in IoT are discussed along with possible solution.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 10
Author(s):  
R H Aswathy ◽  
N Malarvizhi

The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.


2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


2022 ◽  
pp. 104-130
Author(s):  
Sudhakar Hallur ◽  
Roopa Kulkarni ◽  
Prashant P. Patavardhan ◽  
Vishweshkumar Aithal

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


Author(s):  
Alaa Ahmed Abbood ◽  
Qahtan Makki Shallal ◽  
Mohammed A. Fadhel

<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>


2018 ◽  
Vol 33 (6) ◽  
pp. 781-791 ◽  
Author(s):  
Talai Osmonbekov ◽  
Wesley J. Johnston

PurposeThe purpose of this paper is to discuss the potential of Internet of Things (IoT) to affect organizational buying behavior. Potential impacts on organizational communication, buying center structure and processes and privacy and security issues are discussed.Design/methodology/approachThis is a conceptual paper that advances testable propositions based on the technology overview and use of existing organizational buying behavior theory.FindingsThis paper concludes that major changes are likely as a result of the adoption of IoT. The nature of organizational communication may shift to more machine-to-machine communication and buying centers may become smaller, less hierarchical but more coordinated, with less conflict. In addition, privacy and security concerns will need to be addressed.Originality/valueThis is the first attempt to conceptualize the impact of adoption of IoT technologies that may help future researchers to examine the impact on a more granular level. For practitioners, it may help them prepare for the impacts of the IoT technological juggernaut.


Sign in / Sign up

Export Citation Format

Share Document