Essential Requirements of IoT’s Cryptographic Algorithms: Case Study

dc.contributor.authorKumar S.
dc.contributor.authorLone Z.A.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:15:46Z
dc.date.available2021-05-05T10:15:46Z
dc.date.issued2021
dc.description.abstractInternet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 163 - 169en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_16
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/14779
dc.titleEssential Requirements of IoT’s Cryptographic Algorithms: Case Studyen_US
dc.typeConference Paperen_US

Files