Title | Encryption Algorithms based on Security in IoT (Internet of Things) |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Kaur, Amanpreet, Singh, Gurpreet |
Conference Name | 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) |
Date Published | oct |
Keywords | Algorithm, Ciphers, cryptography, Cyber-physical systems, IoT, key, Light Weight, Memory management, pubcrawl, QR codes, Resiliency, Signal processing algorithms, smart cities, Smart homes, threats, Wireless communication, Wireless sensor networks |
Abstract | The Internet is evolving everywhere and expanding its entity globally. The IoT(Internet of things) is a new and interesting concept introduced in this world of internet. Generally it is interconnected computing device which can be embedded in our daily routine objects through which we can send and receive data. It is beyond connecting computers and laptops only although it can connect billion of devices. It can be described as reliable method of communication that also make use of other technologies like wireless sensor, QR code etc. IoT (Internet of Things) is making everything smart with use of technology like smart homes, smart cities, smart watches. In this chapter, we will study the security algorithms in IoT (Internet of Things) which can be achieved with encryption process. In the world of IoT, data is more vulnerable to threats. So as to protect data integrity, data confidentiality, we have Light weight Encryption Algorithms like symmetric key cryptography and public key cryptography for secure IoT (Internet of Things) named as Secure IoT. Because it is not convenient to use full encryption algorithms that require large memory size, large program code and larger execution time. Light weight algorithms meet all resource constraints of small memory size, less execution time and efficiency. The algorithms can be measured in terms of key size, no of blocks and algorithm structure, chip size and energy consumption. Light Weight Techniques provides security to smart object networks and also provides efficiency. In Symmetric Key Cryptography, two parties can have identical keys but has some practical difficulty. Public Key Cryptography uses both private and public key which are related to each other. Public key is known to everyone while private key is kept secret. Public Key cryptography method is based on mathematical problems. So, to implement this method, one should have a great expertise. |
DOI | 10.1109/ISPCC53510.2021.9609495 |
Citation Key | kaur_encryption_2021 |