Internet of Things Protection and Encryption: A Survey

by   Ghassan Samara, et al.

The Internet of Things (IoT) has enabled a wide range of sectors to interact effectively with their consumers in order to deliver seamless services and products. Despite the widespread availability of (IoT) devices and their Internet connectivity, they have a low level of information security integrity. A number of security methods were proposed and evaluated in our research, and comparisons were made in terms of energy and time in the encryption and decryption processes. A ratification procedure is also performed on the devices in the main manager, which is regarded as a full firewall for IoT devices. The suggested algorithm's success has been shown utilizing low-cost Adriano Uno and Raspberry Pi devices. Arduous Uno has been used to demonstrate the encryption process in low-energy devices using a variety of algorithms, including Enhanced Algorithm for Data Integrity and Authentication (EDAI) and raspberry, which serves as a safety manager in low-energy device molecules. A variety of enhanced algorithms used in conjunction with Blockchain software have also assured the security and integrity of the information. These findings and discussions are presented at the conclusion of the paper.




Lightweight Encryption for the Low Powered IoT Devices

The internet of things refers to the network of devices connected to the...

Lightweight Joint Compression-Encryption-Authentication-Integrity Framework Based on Arithmetic Coding

Arithmetic Coding is an efficient lossless compression scheme applied fo...

Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen

Data protection is a severe constraint in the heterogeneous IoT era. Thi...

A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems

In Internet of Things (IoT) systems with security demands, there is ofte...

A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time

Bluetooth Low Energy (BLE) has become an intrinsic wireless technology f...

Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies

Internet of Things (IoT) devices and applications can have significant v...

A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications

We present the first BLS12-381 elliptic curve pairing crypto-processor f...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.