2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2015
DOI: 10.1109/cyberc.2015.9
|View full text |Cite
|
Sign up to set email alerts
|

A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(24 citation statements)
references
References 0 publications
0
24
0
Order By: Relevance
“…An endpoint might be a message sink or base station (BS), which passes data to the next layer of the architecture, as occurs in traditional sensor networks when a sink communicates over a satellite link. To ensure confidential communication of information in an IoT, many schemes have been proposed, schemes which employ existing state-of-art encryption algorithms [32][33][34][35][36][37][38]. A summary of the proposed encryption schemes for IoT with standard cipher algorithms is presented in Table 1.…”
Section: Related Studiesmentioning
confidence: 99%
“…An endpoint might be a message sink or base station (BS), which passes data to the next layer of the architecture, as occurs in traditional sensor networks when a sink communicates over a satellite link. To ensure confidential communication of information in an IoT, many schemes have been proposed, schemes which employ existing state-of-art encryption algorithms [32][33][34][35][36][37][38]. A summary of the proposed encryption schemes for IoT with standard cipher algorithms is presented in Table 1.…”
Section: Related Studiesmentioning
confidence: 99%
“…However, the proposed system uses complex algorithms at each layer which makes it unsuitable for limited power components like sensors and RFID which are regarded as skeleton for IoT. A hybrid encryption technique is proposed in [61] for safeguarding the data in IoT devices. The cryptographic methods used in this technique include Advanced Encryption System (AES) and Elliptic Curve Cryptography (ECC), but these methods are highly complex and drain off the limited battery of nodes rapidly and thus unsuitable for IoT.…”
Section: A Existing Protocolsmentioning
confidence: 99%
“…(vi) Anti-Malware: Security software such as anti-virus, anti-spyware and anti-adware is essential for the confidentiality, reliability and integrity of the IoT network [36].…”
Section: Countermeasure Of Application Layer Threatsmentioning
confidence: 99%