2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) 2017
DOI: 10.1109/ispcc.2017.8269731
|View full text |Cite
|
Sign up to set email alerts
|

A review on lightweight cryptography algorithms for data security and authentication in IoTs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(47 citation statements)
references
References 24 publications
0
47
0
Order By: Relevance
“…Essentially, this is the main focus of LWC research, an interesting research area which investigates the design and implementation of lightweight and compact cryptographic algorithms for resource-constrained devices [34]. Since this paper focuses more on the LWCAR component of the proposed framework, in the following section, we discuss some aspects of LWC and LWCAs.…”
Section: A a Brief Overview Of Security Challenges In The Iotmentioning
confidence: 99%
“…Essentially, this is the main focus of LWC research, an interesting research area which investigates the design and implementation of lightweight and compact cryptographic algorithms for resource-constrained devices [34]. Since this paper focuses more on the LWCAR component of the proposed framework, in the following section, we discuss some aspects of LWC and LWCAs.…”
Section: A a Brief Overview Of Security Challenges In The Iotmentioning
confidence: 99%
“…If the algorithm has the more number of rounds for both encryption and decryption degrades the performances. So in future the hybrid models should be developed to reduce the computation power and increase the efficiency of data security in IOT applications [20]when compared to the conventional algorithms.…”
Section: Twinementioning
confidence: 99%
“…The different attacks on IoT, which includes Denial of service (DoS), Man-in Middle, Wormhole, alteration, fabrication, and eavesdropping. The security challenges of IoT is security and data protection, authentication, privacy, access control, trust, and policy enforcement [4][5][6].…”
Section: Introductionmentioning
confidence: 99%