z-logo
open-access-imgOpen Access
An investigation on cryptographic algorithms usage in IoT contexts
Author(s) -
R. H. Aswathy,
N. Malarvizhi
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i1.7.9379
Subject(s) - computer science , cryptography , key (lock) , algorithm , block (permutation group theory) , constraint (computer aided design) , key exchange , distributed computing , internet of things , computer security , theoretical computer science , encryption , public key cryptography , mathematics , geometry
The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here