Mobile sensors are playing a vital role in various applications of a normal day life. Key size in securing data is an important issue to highlight in mobile sensor data transfer between a smart device and a data stora...
详细信息
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of devices securely to the Internet. Another emerging paradigm is quantum computing which - while opening new compute opportunities -...
详细信息
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of devices securely to the Internet. Another emerging paradigm is quantum computing which - while opening new compute opportunities - was shown to jeopardise most cybersecurity protocols. In this study, we discuss techniques able to provide security in a post-quantum IoT. Specifically, we examine how the third-generation partnership project (3GPP) IoT security solutions fair in a post-quantum environment. Also, we analyse the security features of fifth-generation (5G) networks, propose improvements and discuss the manner in which a quantum computer can compromise security. Our results prove the existence of multiple vulnerabilities in the current IoT architecture and implementations. With advances in quantum computing having rendered the current security algorithms unsafe, more advanced techniques should be established to mitigate such risks. To this end, we present promising lattice-driven cryptographic techniques which we prove quantum resistance.
Sensor devices, RFID tags, wireless sensor networks, Internet of Things and embedded systems, which have increasing usage areas in human life, connect objects internally and maintain continuous communication with each...
详细信息
ISBN:
(纸本)9781538668788
Sensor devices, RFID tags, wireless sensor networks, Internet of Things and embedded systems, which have increasing usage areas in human life, connect objects internally and maintain continuous communication with each other in a controlled manner with the application fields developed with technological investments and incentives. Seizing of data by unauthorized persons constitutes a serious weakness in terms of security. Cryptography algorithms are also used to create a secure communication by avoiding weaknesses. However, limited resources, such as memory, RAM, battery, etc., affect performance, limit the cryptography algorithms to be applied. This article also examines lightweight encryption algorithms developed for use in restricted sources. Examples of articles that include performance tests and analysis of lightweight algorithms in the literature are included. Cryptographic message transmission is performed by using lightweight block encryption algorithms between two objects with different hardware properties and performance analysis is performed.
Bakalářské práce se zabývá rozborem jednotlivých kryptografických algoritmů, které se využívají při zabezpečování komunikace. První část je věnov&...
详细信息
Bakalářské práce se zabývá rozborem jednotlivých kryptografických algoritmů, které se využívají při zabezpečování komunikace. První část je věnována symetrickým kryptografickým algoritmům, asymetrickým kryptografickým algoritmům a hashovacím funkcím. Druhá část se zabývá bezpečností, stupni utajení a útoky, které se využívají při napadání kryptografických algoritmů a hashovacích funkcí. Třetí část se věnuje testování vybraného algoritmu RC4 a hashovací funkce MD5 za pomocí programu CrypTool. V závěrečné části jsou uvedeny a zhodnoceny výsledky testů algoritmu RC4 a hashovací funkce MD5.
暂无评论