1. Security of internet of things based on cryptographic algorithms: a survey
- Author
-
Sina Besharat, Ali Ghaffari, Seyyed Keyvan Mousavi, and Hamed Afshari
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Smart objects ,020206 networking & telecommunications ,020302 automobile design & engineering ,Cryptography ,02 engineering and technology ,Encryption ,Public-key cryptography ,0203 mechanical engineering ,Secure communication ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,Hybrid cryptosystem ,The Internet ,Electrical and Electronic Engineering ,Elliptic curve cryptography ,business ,Personally identifiable information ,Algorithm ,Information Systems - Abstract
Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of interconnected objects. Thus, the security of IoT is highly important. Scalable applications and services are vulnerable to various attacks and information leakage, demanding greater levels of security and privacy. For instance, hacking personal information is a challenge in this regard. The present study is an investigation of symmetric, asymmetric and hybrid encryption algorithms for IoT security. Asymmetric key encryption to ensure secure communication between multiple users and thereby avoiding distributing key on an insecure channel. All algorithms are compared based on security factors. Results indicate that Elliptic Curve Cryptography (ECC) has a better performance than other algorithms in the study. ECC to generate smaller, faster and reliable cryptography keys. Also, ECC decreases the memory requirements and the execution encryption/decryption time. This study helps to understand the importance of several security factors in IoT and advancements in cryptography algorithms.
- Published
- 2021
- Full Text
- View/download PDF