Pregled bibliografske jedinice broj: 1089848
Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms
Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms // Communications in Computer and Information Science Volume 1284 / Dziech A., Mees W., Czyżewski A. (ur.).
Cham: Springer, 2020. str. 168-181 doi:10.1007/978-3-030-59000-0_13 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1089848 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Analysis of Available Microcontroller Computing
Resources for the Application of Some
Cryptographic Hash Functions on Different
Internet of Things Platforms
(Analysis of Available Microcontroller Computing
Resources for
the Application of Some Cryptographic Hash
Functions on
Different Internet of Things Platforms)
Autori
Đokić, Kristian ; Mesić, Tomislav ; Cobović, Mirko
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Communications in Computer and Information Science Volume 1284
/ Dziech A., Mees W., Czyżewski A. - Cham : Springer, 2020, 168-181
ISBN
978-3-030-59000-0
Skup
10th International Conference on Multimedia Communications, Services and Security
Mjesto i datum
Kraków, Poljska, 08.10.2020. - 09.10.2020
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
Fog Computing ; Blockchain ; Internet of Things
Sažetak
In the last few years, there have been more and more security vulnerabilities in IoT devices. Some authors suggest the use of security algorithms and methods used on computers for protection, but in this paper, we propose that some hash encryption algorithms can be used in IoT application to provide integrity and authenticity of a message. It can be used when the risk of data misuse and the need for strong protection are low. Five different development boards are tested to prove that the proposed HMAC algorithm is not too computing-intensive. mbedTLS library has been used, and performance (speed) of boards have been measured with different secret key and payload size. We concluded that SHA256 and HMAC-SHA256 algorithms could be taken into account when deciding on the application of cryptography, primarily due to the ease of use and a low load of the microcontroller.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo, Informacijske i komunikacijske znanosti
POVEZANOST RADA
Ustanove:
Veleučilište u Požegi,
Visoko učilište Algebra, Zagreb ,
Sveučilište u Slavonskom Brodu
Citiraj ovu publikaciju:
Časopis indeksira:
- Scopus