Location

https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php

Streaming Media

Document Type

Event

Start Date

19-11-2024 4:00 PM

Description

With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.

Share

COinS
 
Nov 19th, 4:00 PM

GMC-137 IoT Security Vulnerabilities and How to Improve Them

https://www.kennesaw.edu/ccse/events/computing-showcase/fa24-cday-program.php

With the increased usage of IoT devices in homes as well as different industries, vulnerabilities have also increased significantly. The IoT devices are small in size, and it is hard to incorporate security in the software because security has high demand for computation. We have been conducting this research in order to find more suitable security methods that are lightweight as well as efficient. We have decided to move away from key hiding algorithms, which have increased time and space consumption, in favor of smaller and quicker block cipher algorithms.