2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 2018
DOI: 10.1109/iceeccot43722.2018.9001599
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and Evaluation of Lightweight Ciphers in MQTT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 8 publications
0
4
0
1
Order By: Relevance
“…In the first stage data is encrypted using the lightweight symmetric block cipher. In the later stage lightweight hash function is utilized to confirm the data integrity [23]. Hassan Kurdi et al propose a fog computing based lightweight mutual authentication scheme for Industrial IoT (IIoT) applications.…”
Section: B Major Contributionsmentioning
confidence: 99%
“…In the first stage data is encrypted using the lightweight symmetric block cipher. In the later stage lightweight hash function is utilized to confirm the data integrity [23]. Hassan Kurdi et al propose a fog computing based lightweight mutual authentication scheme for Industrial IoT (IIoT) applications.…”
Section: B Major Contributionsmentioning
confidence: 99%
“…Because TLS is unfeasible for resource-constrained devices, the authors of [23] propose to secure MQTT protocol in two stages. First, the payload is encrypted using a lightweight symmetric block cipher, to limit the overhead with respect to asymmetric encryption.…”
Section: Integritymentioning
confidence: 99%
“…Penelitian yang dilakukan oleh Iyer dkk. membahas tentang implementasi dan evaluasi dari algoritma enkripsi ringan pada lingkungan MQTT [10]. Enkripsi data/payload berguna untuk mengamankan data sensitif yang dikirim oleh publisher dari pihak yang tidak berwenang.…”
Section: Pengaplikasianunclassified