Volume 20 No 9 (2022)
 Download PDF
Security Algorithm Analysis and Implementation in an IoT Environment
B.Kameswara Rao, Dr.A.Saranya, Mr Velidi Saibaba, P G Mamatha, Dillip Narayan Sahu, Venkata Naga Rani Bandaru
Abstract
The Internet of Things (IoT) is becoming more and more popular, and both practitioners and scholars are becoming interested in it. In order to offer information and control over the condition of the items around us, the major goal of IoT is to bring everything in the world together under a single infrastructure, including things, people, places, and processes. A virtual perspective of real-world objects, both living and non-living, is made possible via the "Internet of Things." The Internet of Items (IoT) has significantly altered people's lives, and in the near future, it will have a greater influence on society and link far more things than just humans. IoT is assisting in several smart environment and application domains to address the difficulties that people and companies confront on a daily basis. No matter whether it's at home or at the business, our lives are altering drastically. This piece is focused on The design aspects that were helpful in creating the newly suggested family of lightweight block cyphers are then categorised. The lightweight block cypher family BRIGHT, as well as the superlightweight UBRIGHT and Expanded BRIGHT for the Internet of Things, are discussed in this work. For environments with constraints, the suggested security algorithms offer a variety of block and key sizes. By supporting a variety of cryptographic systems, this allows customers to match their security demands with application requirements.
Keywords
Algorithms, Cryptographic, IoT, Ciphers, Security and Environment
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.