2020
DOI: 10.11591/ijeecs.v18.i2.pp1066-1073
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic keys generation for internet of things

Abstract: <span>In several aspects, interest in IoT has become considerable by researchers and academics in recent years. Data security becomes one of the important challenges facing development of IoT environment. Many algorithms were proposed to secure the IoT applications. The traditional public key cryptographic are inappropriate because it requires high computational. Therefore, lattice-based public-key cryptosystem (LB-PKC) is a favorable technique for IoT security. NTRU is one of a LB-PKC that based on trun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The management of urban water resources pipelines is one of the most important aspects of urban infrastructure management [21]. The intelligent water resources management and allocation platform are a comprehensive system integrating a large database, complex professional models, and advanced software and hardware systems, mainly including the construction of a comprehensive database, application support platform, application software development, and the construction of related hardware platforms [22].…”
Section: Design and Implementation Of Systemmentioning
confidence: 99%
“…The management of urban water resources pipelines is one of the most important aspects of urban infrastructure management [21]. The intelligent water resources management and allocation platform are a comprehensive system integrating a large database, complex professional models, and advanced software and hardware systems, mainly including the construction of a comprehensive database, application support platform, application software development, and the construction of related hardware platforms [22].…”
Section: Design and Implementation Of Systemmentioning
confidence: 99%
“…IoT device adoption, however, may be avoided by many users due to rising worries about software bugs and hacking [2]. A lightweight cipher has been a preferable choice for intelligent and sensor-based applications [1] due to the restricted devices utilized in the IoT (processing, memory, and power) [3]. Any algorithm for cryptography must include pseudorandom number generators.…”
Section: Introductionmentioning
confidence: 99%
“…Guma'a et al [3] propose modifying the NTRU public key cryptosystem to be safe against lattice-based attacks by using the LLL (Lenstra-Lentra-Lovász) algorithm, as well as a way for dynamically generating a new key sequence. According to the results, the suggested solution reduced the NTRU algorithm implementation time by around 0.2 seconds.…”
Section: Introductionmentioning
confidence: 99%