Abstract
AbstractNowadays, securing data over the network become an important concern. When the data is travelled between Robots and the Cloud then there is high chance of the eavesdropping of the data by the attacker. To protect the data secrecy and confidentiality that arises because of the threat, cryptography is used. At first, data is converted into unreadable text (Cipher Text) known as encryption and after receiving the data, receiver performs reverse encryption (decryption). There are many algorithms for performing the encryption and decryption process. That’s why it is necessary to find out which algorithm performs better with resource-constrained and limited computing ability devices. In this paper, various encryption techniques like DES, 3DES, AES, Blowfish and ECIES are analysed based on encryption and decryption time. This encryption mechanism consumes significant number of resources like memory utilisation, CPU time, computation time, etc. In this paper, we compared different cryptographic algorithms in terms of key size, block size, Power consumption and speed. The simulation results will be calculated in terms of encryption and decryption time of the algorithms.KeywordsRobotsSymmetric Key CryptographyAsymmetric Key CryptographyCloud roboticsECIES
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.