{"title":"物联网环境下轻量级加密的性能评估与回顾","authors":"Abdurrahman Beg, Talal Al-Kharobi, A. Al-Nasser","doi":"10.1109/CAIS.2019.8769509","DOIUrl":null,"url":null,"abstract":"Internet-of-Things is used in numerous applications including industrial, military systems and the platform like any other on the internet is vulnerable to security threats. However, due to the nature of the devices used, conventional security methods can incur an overhead and may obstruct the mission of the application due to resource constraints of the devices involved. To alleviate this problem, lightweight cryptographic algorithms have been proposed. Development and implementation of such algorithms continue to move forward; however, it remains a challenge to find suitable algorithms that match the specific needs of the IoT application implementer. In this paper, lightweight cryptography algorithms are categorized, and a few are chosen to be simulated and compared using metrics relevant to an Internet-of-Things environment.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment\",\"authors\":\"Abdurrahman Beg, Talal Al-Kharobi, A. Al-Nasser\",\"doi\":\"10.1109/CAIS.2019.8769509\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet-of-Things is used in numerous applications including industrial, military systems and the platform like any other on the internet is vulnerable to security threats. However, due to the nature of the devices used, conventional security methods can incur an overhead and may obstruct the mission of the application due to resource constraints of the devices involved. To alleviate this problem, lightweight cryptographic algorithms have been proposed. Development and implementation of such algorithms continue to move forward; however, it remains a challenge to find suitable algorithms that match the specific needs of the IoT application implementer. In this paper, lightweight cryptography algorithms are categorized, and a few are chosen to be simulated and compared using metrics relevant to an Internet-of-Things environment.\",\"PeriodicalId\":220129,\"journal\":{\"name\":\"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIS.2019.8769509\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIS.2019.8769509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment
Internet-of-Things is used in numerous applications including industrial, military systems and the platform like any other on the internet is vulnerable to security threats. However, due to the nature of the devices used, conventional security methods can incur an overhead and may obstruct the mission of the application due to resource constraints of the devices involved. To alleviate this problem, lightweight cryptographic algorithms have been proposed. Development and implementation of such algorithms continue to move forward; however, it remains a challenge to find suitable algorithms that match the specific needs of the IoT application implementer. In this paper, lightweight cryptography algorithms are categorized, and a few are chosen to be simulated and compared using metrics relevant to an Internet-of-Things environment.