Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment

Abdurrahman Beg, Talal Al-Kharobi, Ahmad Al-Nasser

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Internet-of-Things is used in numerous applications including industrial, military systems and the platform like any other on the internet is vulnerable to security threats. However, due to the nature of the devices used, conventional security methods can incur an overhead and may obstruct the mission of the application due to resource constraints of the devices involved. To alleviate this problem, lightweight cryptographic algorithms have been proposed. Development and implementation of such algorithms continue to move forward; however, it remains a challenge to find suitable algorithms that match the specific needs of the IoT application implementer. In this paper, lightweight cryptography algorithms are categorized, and a few are chosen to be simulated and compared using metrics relevant to an Internet-of-Things environment.

Original languageEnglish
Title of host publication2nd International Conference on Computer Applications and Information Security, ICCAIS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728101088
DOIs
StatePublished - May 2019

Publication series

Name2nd International Conference on Computer Applications and Information Security, ICCAIS 2019

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • encryption
  • internet-of-things
  • lightweight cryptography
  • security
  • wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Health Informatics
  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment'. Together they form a unique fingerprint.

Cite this