Essential Requirements of IoT’s Cryptographic Algorithms: Case Study

dc.contributor.authorKumar, S.
dc.contributor.authorLone, Z.A.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:36:26Z
dc.date.issued2021
dc.description.abstractInternet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
dc.identifier.citationLecture Notes in Electrical Engineering, 2021, Vol.698, , p. 163-169
dc.identifier.issn18761100
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_16
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/30462
dc.publisherSpringer Science and Business Media Deutschland GmbH info@springer-sbm.com
dc.subjectAEL
dc.subjectBEAN
dc.subjectCryptography
dc.subjectDESL
dc.subjectGRAIN
dc.subjectIoT
dc.subjectKATAN
dc.subjectLightweight cryptography
dc.subjectQuavium
dc.subjectTrivium
dc.titleEssential Requirements of IoT’s Cryptographic Algorithms: Case Study

Files