Location
https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php
Streaming Media
Document Type
Event
Start Date
19-11-2024 4:00 PM
Description
With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.
GMC-137 IoT Security Vulnerabilities and How to Improve Them
https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php
With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.