ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Securing IOT Based Devices Using Cryptanalysis

Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 7)

Publication Date:

Authors : ;

Page : 356-358

Keywords : IOT; security attacks; cryptography; SIT algorithm; IDEA algorithm; blowfish algorithm; RSA algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

With the advancement of technologies in last few decades, the need and use of IOT devices has been increasing drastically. Internet of Things (IOT) refers to the physical devices around the globe that are connected over the internet that helps us to share the data conveniently and accurately. The main components of any IOT device are sensor, actuator and computer devices which are attached to a particular object that is connected to internet and helps in transfer of data from source to destination. There is no denying the fact that IOT devices play vital role in providing a good quality of life but at the same time it is very important to provide security to an IOT device such that our confidential information cannot be hacked. In this research paper, we will see various cryptographic algorithms that provide security to IOT devices in order to protect it from security attacks.

Last modified: 2021-06-28 17:09:23