Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/14779
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar S. | |
dc.contributor.author | Lone Z.A. | |
dc.contributor.author | Chandavarkar B.R. | |
dc.date.accessioned | 2021-05-05T10:15:46Z | - |
dc.date.available | 2021-05-05T10:15:46Z | - |
dc.date.issued | 2021 | |
dc.identifier.citation | Lecture Notes in Electrical Engineering , Vol. 698 , , p. 163 - 169 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-981-15-7961-5_16 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/14779 | - |
dc.description.abstract | Internet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. | en_US |
dc.title | Essential Requirements of IoT’s Cryptographic Algorithms: Case Study | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.