Analysis of cryptographic methods for ensuring security in the field of Internet of Things
Authors: Temirbekova Zhanerke Erlanovna, Abdiakhmetova Zukhra Muratovna, Tynymbayev Sakhybay (IJEECS 37172) In the dynamic landscape of the Internet of Th...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Poland under the topic 'stranger things'.
About this video
Authors: Temirbekova Zhanerke Erlanovna, Abdiakhmetova Zukhra Muratovna, Tynymbayev Sakhybay (IJEECS 37172)
In the dynamic landscape of the Internet of Things (IoT), where billions of interconnected devices facilitate the exchange of data ranging from sensitive personal information to critical industrial data, the paramount importance of security and privacy cannot be overstated. As the number of IoT devices continues to soar, so do the associated challenges concerning their security and privacy. Evaluating the efficacy of cryptographic solutions within IoT systems emerges as a crucial endeavor to uphold the integrity and reliability of these systems. Amidst the rapid evolution of IoT technology, safeguarding the confidentiality, integrity, and availability of data emerges as a top priority. This article underscores the significance of deploying robust cryptographic algorithms to fortify IoT devices against a myriad of potential threats. Effective evaluation of cryptographic solutions within IoT systems entails a comprehensive analysis and comparison of diverse algorithms, coupled with an assessment of their performance, resilience against attacks, and resource utilization. Central to evaluating the effectiveness of cryptographic solutions within IoT systems is a consideration of various factors including computational complexity, power consumption of devices, ease of implementation, and compatibility with existing infrastructures. By meticulously scrutinizing these aspects, stakeholders can gauge the suitability of cryptographic solutions for integration into IoT systems, thus bolstering their security posture and mitigating potential vulnerabilities. This article explores a range of cryptographic solutions including AES, El-Gamal, and Paillier. These algorithms implemented on the ATmega2560 microcontroller, allowing for a comprehensive assessment of key parameters such as efficiency in terms of encryption and decryption times, power consumption, and memory usage. Through this evaluation process, the article aims to identify the most suitable encryption algorithms that offer robust protection for IoT devices, thus informing strategic decisions in safeguarding sensitive data within IoT environments.
Indonesian Journal of Electrical Engineering and Computer Science
https://ijeecs.iaescore.com
Supported by Master Program of Electrical and Computer Engineering, Universitas Ahmad Dahlan, https://mee.uad.ac.id #yogyakarta
Admission: https://mee.uad.ac.id/pendaftaran/
#scopus #journal #publications #publication #uad #electricvehicle #EV #solution #environment #pollution #passenger #fieldorientedcontrolled #FOC #PermanentMagnetSynchronousMotor #PMSM #MATLAB #gradient #truck #regenerative #propulsion #MachineLearning #DeepLearning #InternetOfThings #Classification #CloudComputing #ConvolutionalNeuralNetwork #CNN #SupportVectorMachine #SVM #GeneticAlgorithm #IoT #Security #ArtificialIntelligence #Optimization #COVID-19 #ParticleSwarmOptimization #PSO #ImageProcessing #Clustering #NeuralNetwork #ArtificialNeuralNetwork #FuzzyLogic #RenewableEnergy #5G #WirelessSensorNetwork #WSN #DataMining #Cryptography #Photovoltaic #FeatureSelection #Encryption #Microcontroller #DistributedGeneration #FeatureExtraction #NaturalLanguageProcessing #NLP #TransferLearning #WirelessSensorNetworks #Prediction #SentimentAnalysis #PowerQuality #Simulation #DecisionTree #BigData #RandomForest #Arduino #Sensors #Segmentation #EnergyEfficiency #FPGA #MobileApplication #Algorithm #EnergyConsumption #MATLAB #Blockchain #PIDController #Sensor #Authentication #ComputerVision #THD #TotalHarmonicDistortion #Harmonics #RaspberryPi #FaceRecognition #ImageClassification #IntrusionDetectionSystem #LuminousFlux #QualityOfService #QoS #ElectricVehicle #EV #Network #Routing #SocialMedia #SosMed #Steganography #TextMining #Throughput #Accuracy #AugmentedReality #DeepNeuralNetwork #MANET #MultilevelInverter #NaiveBayes #Performance #Temperature #TextClassification #Elearning #LoadBalancing #NetworkLifetime #PrincipalComponentAnalysis #PCA #Android #BitErrorRate #BER #ColorHomogeneity #Efficiency #Healthcare #MPPT #Microgrid #MiescatteringTheory #RFID #KNN #OFDM #GPS #GSM
Video Information
Views
60
Total views since publication
Duration
12:03
Video length
Published
Nov 24, 2024
Release date
Quality
hd
Video definition