Abstract
The number of internet of things (IoT) devices continues to grow, and so do the associated concerns regarding their security and privacy. Evaluating the efficacy of cryptographic solutions within IoT systems emerges as a crucial endeavor to uphold the integrity and reliability of these systems. Amidst the rapid evolution of IoT technology, safeguarding the confidentiality, integrity, and availability of data emerges as a top priority. This article underscores the significance of deploying robust cryptographic algorithms to fortify IoT devices against a myriad of potential threats. Effective evaluation of cryptographic solutions within IoT systems entails a comprehensive analysis and comparison of diverse algorithms, coupled with an assessment of their performance, resilience against attacks, and resource utilization. Central to evaluating the effectiveness of cryptographic solutions within IoT systems is a consideration of various factors including computational complexity, power consumption of devices, ease of implementation, and compatibility with existing infrastructures. This article reviews a number of cryptographic solutions including Rivest–Shamir–Adleman (RSA), El-Gamal, Paillier. These algorithms are implemented on the ATmega2560 microcontroller, which allows for a comprehensive assessment of key parameters such as efficiency in terms of encryption and decryption time, power consumption, and memory usage of IoT devices.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have