Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • noneedit
  • Ph.D. Student in CyberSecurityedit
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor network (WSN) and provide the users with new experiences. The pervasive of devices on the... more
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor network (WSN) and provide the users with new experiences. The pervasive of devices on the internet has hugely increased which makes paramount the need for securing devices and data against threats. These devices communicate on a public channel which makes them a convenient target to be accessed by unauthorized users and break through the privacy of veritable users. Therefore, the security of constrained end nodes is important to protect data against passive or active attacks. If one single node is attacked, the network might suffer severe damage. However, many researchers find it immensely difficult to implement efficient cryptographic algorithms on constrained devices due to the limitation of their resources; the requirements on less memory and energy consumption led cryptographs to build lightweight cryptography solutions targeting confidentiality, authentication, and integrity. In this paper, we focus on authentication solutions based on lightweight hash functions. We present and compare various lightweight hash functions in terms of conception, security, and performance. According to the obtained results, we will be able to select the most appropriate lightweight hash function suitable for an authentication mechanism in IoT environments.
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous... more
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous... more
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor network (WSN) and provide the users with new experiences. The pervasive of devices on the... more
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor network (WSN) and provide the users with new experiences. The pervasive of devices on the internet has hugely increased which makes paramount the need for securing devices and data against threats. These devices communicate on a public channel which makes them a convenient target to be accessed by unauthorized users and break through the privacy of veritable users. Therefore, the security of constrained end nodes is important to protect data against passive or active attacks. If one single node is attacked, the network might suffer severe damage. However, many researchers find it immensely difficult to implement efficient cryptographic algorithms on constrained devices due to the limitation of their resources; the requirements on less memory and energy consumption led cryptographs to build lightweight cryptography solutions targeting confidentiality, authentication, and integrity. In this paper, we focus on authentication solutions based on lightweight hash functions. We present and compare various lightweight hash functions in terms of conception, security, and performance. According to the obtained results, we will be able to select the most appropriate lightweight hash function suitable for an authentication mechanism in IoT environments.