{"title":"物联网中轻量级加密技术的详细分析","authors":"S. Srinath, G. Nagaraja, Ramesh Shahabadkar","doi":"10.1109/CSITSS54238.2021.9683091","DOIUrl":null,"url":null,"abstract":"The use of internet-of-things technology has risen due to the many advantages it offers. The IoT devices network collects and transmits data for processing and performs necessary actions after processing the data. The IoT devices do not have many security mechanisms due to limited functionalities, which can cause the data to be hacked while transmitting it to the server. To provide security to the data, cryptographic techniques can be used. The IoT devices cannot support traditional cryptographic algorithms as they cannot be implemented with the limited resources they possess. Therefore, lightweight cryptographic algorithms have been introduced that are designed to adhere to the restrictions of IoT devices. This paper conducts a study of various works of literature which implement lightweight cryptographic algorithms for heterogeneous IoT devices to provide security to the data being transmitted by constrained IoT devices.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A detailed Analysis of Lightweight Cryptographic techniques on Internet-of-Things\",\"authors\":\"S. Srinath, G. Nagaraja, Ramesh Shahabadkar\",\"doi\":\"10.1109/CSITSS54238.2021.9683091\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of internet-of-things technology has risen due to the many advantages it offers. The IoT devices network collects and transmits data for processing and performs necessary actions after processing the data. The IoT devices do not have many security mechanisms due to limited functionalities, which can cause the data to be hacked while transmitting it to the server. To provide security to the data, cryptographic techniques can be used. The IoT devices cannot support traditional cryptographic algorithms as they cannot be implemented with the limited resources they possess. Therefore, lightweight cryptographic algorithms have been introduced that are designed to adhere to the restrictions of IoT devices. This paper conducts a study of various works of literature which implement lightweight cryptographic algorithms for heterogeneous IoT devices to provide security to the data being transmitted by constrained IoT devices.\",\"PeriodicalId\":252628,\"journal\":{\"name\":\"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)\",\"volume\":\"109 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSITSS54238.2021.9683091\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSITSS54238.2021.9683091","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A detailed Analysis of Lightweight Cryptographic techniques on Internet-of-Things
The use of internet-of-things technology has risen due to the many advantages it offers. The IoT devices network collects and transmits data for processing and performs necessary actions after processing the data. The IoT devices do not have many security mechanisms due to limited functionalities, which can cause the data to be hacked while transmitting it to the server. To provide security to the data, cryptographic techniques can be used. The IoT devices cannot support traditional cryptographic algorithms as they cannot be implemented with the limited resources they possess. Therefore, lightweight cryptographic algorithms have been introduced that are designed to adhere to the restrictions of IoT devices. This paper conducts a study of various works of literature which implement lightweight cryptographic algorithms for heterogeneous IoT devices to provide security to the data being transmitted by constrained IoT devices.