Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published March 13, 2019 | Version v1
Journal article Open

Performance Analysis of Light Weight Security Algorithms for Resource Constrained Devices

Creators

  • 1. Assistant Prof., Computer Science and Engineering, Islamic University of Science and Technology, Kashmir (India)

Description

With the advent of technologies like Internet of Things (IoT) and Machine to Machine (M2M) communication, a huge quantity of data is generated every day. Being a distributed system of constrained devices, this data needs to be communicated securely without wasting the resources of constrained devices. Therefore there is need of appropriate lightweight security protocols to avoid the security threat to future internet. In this context, a study of lightweight security algorithms is presented in this paper. The algorithms are first theoretically analyzed followed by their implementation on Cryptool and Raspberry Pi in order to check their efficacy.

Files

246-253_RRIJM190403059.pdf

Files (396.3 kB)

Name Size Download all
md5:be28100a27aa45dfe8f5204e4e18346e
396.3 kB Preview Download