Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/14779
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar S.
dc.contributor.authorLone Z.A.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:15:46Z-
dc.date.available2021-05-05T10:15:46Z-
dc.date.issued2021
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 163 - 169en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_16
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/14779-
dc.description.abstractInternet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.titleEssential Requirements of IoT’s Cryptographic Algorithms: Case Studyen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.