Location
https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php
Document Type
Event
Start Date
19-11-2024 4:00 PM
Description
With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.
Included in
GMC-137 IoT Security Vulnerabilities and How to Improve Them
https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php
With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.