2022
DOI: 10.32604/iasc.2022.020422
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Key Management System Based Lightweight Devices in IoT

Abstract: The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The performance of the secure model framework is further analyzed concerning the time for generation of the hash and the level of security. The robustness of the security mechanism in the proposed model is analyzed with other approaches such as Point-on-Curve-based Fowler–Noll–Vo (PoC-FNV), RACE Integrity Primitives Evaluation Message Digest (RIPEMD), Message Digest Algorithm 5 (MD5), Spooky Hash, and Fowler–Noll–Vo (FNV) [ 30 , 31 ]. The corresponding graph for time consumption to generate the graph is shown in Figure 9 .…”
Section: Resultsmentioning
confidence: 99%
“…The performance of the secure model framework is further analyzed concerning the time for generation of the hash and the level of security. The robustness of the security mechanism in the proposed model is analyzed with other approaches such as Point-on-Curve-based Fowler–Noll–Vo (PoC-FNV), RACE Integrity Primitives Evaluation Message Digest (RIPEMD), Message Digest Algorithm 5 (MD5), Spooky Hash, and Fowler–Noll–Vo (FNV) [ 30 , 31 ]. The corresponding graph for time consumption to generate the graph is shown in Figure 9 .…”
Section: Resultsmentioning
confidence: 99%
“…hyb sym KM hom hyb [44,74] [+] This category is efficient for secure device-to-device, and group communication in dynamic networks.…”
Section: Categorymentioning
confidence: 99%