2023
DOI: 10.1016/j.iot.2023.100759
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography Algorithms for Enhancing IoT Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(6 citation statements)
references
References 169 publications
0
6
0
Order By: Relevance
“…Various studies and research efforts have been carried out to explore and enhance the performance and safety of cryptographic algorithms in cloud computing environments. Several studies have investigated security in cloud computing and Internet of Things (IoT) [1,[8][9][10][11][12]. In [13], a proposal was presented to improve the AES algorithm to better address emerging privacy threats in the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Various studies and research efforts have been carried out to explore and enhance the performance and safety of cryptographic algorithms in cloud computing environments. Several studies have investigated security in cloud computing and Internet of Things (IoT) [1,[8][9][10][11][12]. In [13], a proposal was presented to improve the AES algorithm to better address emerging privacy threats in the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Through encryption and related methods, it aims to uphold privacy, integrity and safe transfer of sensitive data online and in the cloud. As technologies continue to connect the world in new ways, responsible use of cryptography remains important for responsible data stewardship [1]. Fundamentally, cryptography consists of two steps: data concealment through encryption and data restoration for authorized users through decryption.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, encryption plays a major role in the developing field of block chain technology [13] by guaranteeing the immutability and integrity of distributed ledgers, allowing safe transactions. Many real time applications like Web Browsing [14], Messaging Apps [15], Bitcoin Transactions [13], Full Disk Encryption [16], Cloud Storage Encryption [17], Two-Factor authentication [12], Digital Signatures in Emails, Smart Home Devices & IoT devices [1], Military, Document security has increased the significance of encryption.…”
Section: Applicationsmentioning
confidence: 99%
“…Therefore, it will be essential to secure this growing amount of data while it is being transmitted. Cryptography is a crucial instrument used to protect this data [1].The study of encrypting and decrypting data using mathematics is known as cryptography. With the use of cryptography, you can send or keep confidential data over unsecure networks, such as the Internet, such that only the intended receiver can read it.…”
mentioning
confidence: 99%
See 1 more Smart Citation