2014 2nd International Conference on Information and Communication Technology (ICoICT) 2014
DOI: 10.1109/icoict.2014.6914043
|View full text |Cite
|
Sign up to set email alerts
|

An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 3 publications
0
21
0
Order By: Relevance
“…Similarly, smartphones exhibit their versatility being used as gateway [267][268][269], user interface [270,271], and sensing [265,266] IoT devices. Meanwhile, FPGAs have exhibited a sigmoid exponential phase growth in the last two years, with applications such as data encryption [273][274][275], routing algorithms optimization [276], and parallel networks simulation [277].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, smartphones exhibit their versatility being used as gateway [267][268][269], user interface [270,271], and sensing [265,266] IoT devices. Meanwhile, FPGAs have exhibited a sigmoid exponential phase growth in the last two years, with applications such as data encryption [273][274][275], routing algorithms optimization [276], and parallel networks simulation [277].…”
Section: Discussionmentioning
confidence: 99%
“…The Field-Programmable Gate Array (FPGA) is a hardware reconfigurable component that contains an array of computational (logic) elements, with a functionality specified by a hardware description language [272]. These FPGAs are used in IoT investigations for data encryption [273][274][275], routing algorithms [276], and parallel simulation [277]. A microcontroller (MCU) is a small computer on a single integrated circuit, which includes a processor core, RAM/ROM memory, peripherals, and, in some cases, RF transceivers.…”
Section: Device Operating Systems (Os) and Hardwarementioning
confidence: 99%
“…An endpoint might be a message sink or base station (BS), which passes data to the next layer of the architecture, as occurs in traditional sensor networks when a sink communicates over a satellite link. To ensure confidential communication of information in an IoT, many schemes have been proposed, schemes which employ existing state-of-art encryption algorithms [32][33][34][35][36][37][38]. A summary of the proposed encryption schemes for IoT with standard cipher algorithms is presented in Table 1.…”
Section: Related Studiesmentioning
confidence: 99%
“…Blowfish algorithm is implemented on FPGA using VHDL programming language [12,13]. The blowfish algorithm is analyzed by ascertaining certain measurements in order to achieve better performance such as encryption time, throughput, avalanche effect, and security.…”
Section: Background and Previous Research 21 Related Workmentioning
confidence: 99%