Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/576825
Title: Design and Development of Optimized Light Weight Security for IOT Applications
Researcher: Poojari, Asmita
Guide(s): Nagesh, H R
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2023
Abstract: Technology is advancing quickly, and this is affecting how the internet works. The internet was utilised by people to communicate with one another. However, as a result of recent changes, more gadgets are now being connected to one another over the internet along with people and hence the evolution of Internet of Things (IoT). IoT is growing more widespread and well-liked as a result of its many uses across a variety of industries. They gather information from the real world and transmit it across networks. With the exponential growth of the Internet of Things through time there has been an enormous increase in the usage of tiny devices and information being exchanged, between low resource devices like sensors, PDA s and the high-end devices like servers or clouds. This opens up several challenges in securing the information being exchanged. Additionally, a lot of them have limited resources, like energy, memory, computing power, and even physical space, making it difficult to implement conventional security measures. Consequently, there is a greater demand for designing encryption algorithms, especially with regard to resource-constrained devices. Although low resource devices can implement the typical NIST certified algorithms, their efficiency may raise questions and thus limited device algorithms need to be designed and implemented. newlineIn order to take use of each methodology, logic style, or algorithm, the majority of designers in practise carefully blend various approaches. In our research we propose a method combining the properties of the HIGHT and the BRIGHT cipher implemented in software as well as hardware. newlineFirst, the widely used conventional and lightweight cryptographic ciphers are examined. In this study, we highlight several cipher types and the significant encryption methods which used to build these ciphers. These ciphers are compared and contrasted on the grounds of network structure used, the block size, key size, code size and RAM consumption. Based on the analysis, a combination of the ARX and F
Pagination: 109
URI: http://hdl.handle.net/10603/576825
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File34.12 kBAdobe PDFView/Open
02_prelim pages.pdf1.01 MBAdobe PDFView/Open
03_content.pdf126.34 kBAdobe PDFView/Open
04_abstract.pdf117.56 kBAdobe PDFView/Open
05_chapter 1.pdf538.77 kBAdobe PDFView/Open
06_chapter 2.pdf452.44 kBAdobe PDFView/Open
07_chapter 3.pdf892.6 kBAdobe PDFView/Open
08_chapter 4.pdf1.04 MBAdobe PDFView/Open
09_chapter 5.pdf992.44 kBAdobe PDFView/Open
10_annexures.pdf630.01 kBAdobe PDFView/Open
80_recommendation.pdf254.4 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: