Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/576825
Title: | Design and Development of Optimized Light Weight Security for IOT Applications |
Researcher: | Poojari, Asmita |
Guide(s): | Nagesh, H R |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2023 |
Abstract: | Technology is advancing quickly, and this is affecting how the internet works. The internet was utilised by people to communicate with one another. However, as a result of recent changes, more gadgets are now being connected to one another over the internet along with people and hence the evolution of Internet of Things (IoT). IoT is growing more widespread and well-liked as a result of its many uses across a variety of industries. They gather information from the real world and transmit it across networks. With the exponential growth of the Internet of Things through time there has been an enormous increase in the usage of tiny devices and information being exchanged, between low resource devices like sensors, PDA s and the high-end devices like servers or clouds. This opens up several challenges in securing the information being exchanged. Additionally, a lot of them have limited resources, like energy, memory, computing power, and even physical space, making it difficult to implement conventional security measures. Consequently, there is a greater demand for designing encryption algorithms, especially with regard to resource-constrained devices. Although low resource devices can implement the typical NIST certified algorithms, their efficiency may raise questions and thus limited device algorithms need to be designed and implemented. newlineIn order to take use of each methodology, logic style, or algorithm, the majority of designers in practise carefully blend various approaches. In our research we propose a method combining the properties of the HIGHT and the BRIGHT cipher implemented in software as well as hardware. newlineFirst, the widely used conventional and lightweight cryptographic ciphers are examined. In this study, we highlight several cipher types and the significant encryption methods which used to build these ciphers. These ciphers are compared and contrasted on the grounds of network structure used, the block size, key size, code size and RAM consumption. Based on the analysis, a combination of the ARX and F |
Pagination: | 109 |
URI: | http://hdl.handle.net/10603/576825 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 34.12 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.01 MB | Adobe PDF | View/Open | |
03_content.pdf | 126.34 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 117.56 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 538.77 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 452.44 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 892.6 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.04 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 992.44 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 630.01 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 254.4 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: