{"title":"不同应用中用于物联网安全和隐私的不同加密和解密技术综述","authors":"R. Hussain, Irfan Abdullah","doi":"10.1109/SEGE.2018.8499430","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) allows different devices connected to global network or Internet for desired application. This emerging trend of Internet of Things have been developing with exponential rate since last two decades and where different technologies and protocol stacks have been introduced in market. While developing different techniques of integration of smart devices we are facing security and privacy issues of data. To cope up with these issues different techniques have been introduced to overcome this problem. In this research paper we provide the survey of different techniques and technologies used to provide reliable and secure data communications. This research paper will focus on encryption and decryption techniques used in IoT.","PeriodicalId":123677,"journal":{"name":"2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Review of Different Encryptionand Decryption Techniques Used for Security and Privacy of IoT in Different Applications\",\"authors\":\"R. Hussain, Irfan Abdullah\",\"doi\":\"10.1109/SEGE.2018.8499430\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) allows different devices connected to global network or Internet for desired application. This emerging trend of Internet of Things have been developing with exponential rate since last two decades and where different technologies and protocol stacks have been introduced in market. While developing different techniques of integration of smart devices we are facing security and privacy issues of data. To cope up with these issues different techniques have been introduced to overcome this problem. In this research paper we provide the survey of different techniques and technologies used to provide reliable and secure data communications. This research paper will focus on encryption and decryption techniques used in IoT.\",\"PeriodicalId\":123677,\"journal\":{\"name\":\"2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE)\",\"volume\":\"161 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SEGE.2018.8499430\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEGE.2018.8499430","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review of Different Encryptionand Decryption Techniques Used for Security and Privacy of IoT in Different Applications
Internet of Things (IoT) allows different devices connected to global network or Internet for desired application. This emerging trend of Internet of Things have been developing with exponential rate since last two decades and where different technologies and protocol stacks have been introduced in market. While developing different techniques of integration of smart devices we are facing security and privacy issues of data. To cope up with these issues different techniques have been introduced to overcome this problem. In this research paper we provide the survey of different techniques and technologies used to provide reliable and secure data communications. This research paper will focus on encryption and decryption techniques used in IoT.