2019
DOI: 10.3390/s19112484
|View full text |Cite
|
Sign up to set email alerts
|

Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation

Abstract: Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 46 publications
0
18
0
Order By: Relevance
“…(The operations described above and depicted in Figures 2-4 make use of these data structures.) 1,3,4,5,6,9,12,13,16,19,20,21,22,25,28,37,38,41,42,45,46…”
Section: Internal State Driversmentioning
confidence: 99%
See 1 more Smart Citation
“…(The operations described above and depicted in Figures 2-4 make use of these data structures.) 1,3,4,5,6,9,12,13,16,19,20,21,22,25,28,37,38,41,42,45,46…”
Section: Internal State Driversmentioning
confidence: 99%
“…Currently, the most effective and widely used cryptosystems, such as Advanced Encryption Standard (AES) [3], require greater computation ability as well as greater ship sizes. The non-lightweight ciphers have slower speed and low throughput [4,5]. Lightweight cryptosystems provide solutions for issues raised by implementing AES, for example, encryption speed and power consumption.Lightweight stream ciphers, for example, present a more secure solution for small devices, such as microcontrollers and RFID components, namely, RFID tags and RFID readers.…”
mentioning
confidence: 99%
“…In IoT heterogeneous devices are able to remotely connect to the network on the fly necessitating the requirement of security. Monitoring an organization's security perimeter is crucial for intrusion detection to control unauthorized access [9]. Also, it is not practical for an administrator to scan each individual association request.…”
Section: System Architecture and Components Of Authentication Systemmentioning
confidence: 99%
“…The ''Things'' in IoT refers to the smart devices that have limited computing capabilities, with the ability to automatically sense and react to the working environment. IoT has greatly revolutionized our lifestyle by offering us the convenience and flexibility through innovative applications, such as smart homes, smart cities, smart vehicles, health-monitoring systems, and many other IoT applications [1].…”
Section: Introductionmentioning
confidence: 99%