Abstract
Wireless communication-based services compromised with security threats due to the open channel communication model. Free communication channel models have limited bandwidth and open port communication. Due to the limited bandwidth implementation of security channel is a very complex process in the internet of things (IoT). The trend of technology is interdisciplinary of the IoT puts the demands of secured communication. The key generation mechanism provides the end to end security communication process for the internet of things (IoT). In the process of approval and authentication used lightweight key generation methods for protection. The key generation mechanism used symmetric, asymmetric and hybrid cryptography. The process of a key generation faced a problem of high energy and time complexity. In this paper presents the study and analysis of key generation algorithms used in the internet of things (IoT). For the generation of key, four algorithms are used such as AES, 3DES, RSA and ECC. These algorithms used different key size and different file size and measured the computational cost. The measured computational cost gives the direction of key generation for wireless based device communication.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Discrete Mathematical Sciences and Cryptography
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.