Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4950393 | Future Generation Computer Systems | 2017 | 23 Pages |
Abstract
This security encompasses a very broad concept that can be addressed in multiple ways. This work focuses on the techniques and cryptographic algorithms that can be used in the messages exchanged among the nodes to create secure Internet of Things networks in a way to protect our communications. In this article, we have used the Midgar platform to evaluate the different possibilities of traditional security techniques related to cryptography with the purpose of testing the different combinations to find a solution for the Internet of Things when it uses insecure protocols. Analysing the results to determine the best solution, in terms of costs and security, we concluded that the use the RSA, AES and SHA-3 algorithms are a real possibility to protect message privacy among smart objects. This combination offers the lowest consumption-security relation among all the combinations that we have tested in our evaluation.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Gonzalo Sánchez-Arias, Cristian González GarcÃa, B. Cristina Pelayo G-Bustelo,