Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things

Descripción del Articulo

dr@jorgeluishilario.com
Detalles Bibliográficos
Autores: Sandoya, Fernando, Dhamodharan, D., Hilario Rivas, Jorge Luis, Choque Flores, Leopoldo, Thaddeus, S.
Formato: artículo
Fecha de Publicación:2021
Institución:Universidad Nacional de Ucayali
Repositorio:UNU-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.unu.edu.pe:20.500.14621/5553
Enlace del recurso:https://hdl.handle.net/20.500.14621/5553
Nivel de acceso:acceso abierto
Materia:Elliptic Curve Cryptography
Encryption
Decryption
Internet of things
Security
Twofish
Algorithm
Ciencias de la Computación
https://purl.org/pe-repo/ocde/ford#5.08.02
id RUNU_73f07092bd2197b5d6bb169c65c03690
oai_identifier_str oai:repositorio.unu.edu.pe:20.500.14621/5553
network_acronym_str RUNU
network_name_str UNU-Institucional
repository_id_str 4869
spelling Sandoya, FernandoDhamodharan, D.Hilario Rivas, Jorge LuisChoque Flores, LeopoldoThaddeus, S.2022-07-01T18:11:21Z2022-07-01T18:11:21Z2021Solicitud Emailhttps://hdl.handle.net/20.500.14621/5553dr@jorgeluishilario.comThe implicit idea of the IoT is to follow client's identity effectively, so the security and protection concerns like theft the information and disturbance of tasks are turning out to be basic issues in the present IoT applications. Aggressor can pick up the access to the system can harm the physical gadgets of IoT can harm the system which bargains the protection and security of IoT. As the IoT gadgets have low memory, less force and data transmission a productive arrangement to give security is required that won't chomp through the resources of IoT. Because of the resource constrained condition in IoT the regular algorithms isn't sufficient to guarantee the information security. So we want a less computational expense as far as force utilization, memory management and more effective cryptography algorithms to offer more information security in IoT. This paper shows the hybrid cryptography security in IoT by embedding of ECC and TwoFish calculation, which gives an enhanced answer for upgrade the security highlights of the IoT with the goal that we can improve the administration therefore achieves growing the trust over the advancement.engUniversidad Nacional de UcayaliPEinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Universidad Nacional de UcayaliRepositorio institucional - UNUreponame:UNU-Institucionalinstname:Universidad Nacional de Ucayaliinstacron:UNUElliptic Curve CryptographyEncryptionDecryptionInternet of thingsSecurityTwofishAlgorithmCiencias de la Computaciónhttps://purl.org/pe-repo/ocde/ford#5.08.02Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Thingsinfo:eu-repo/semantics/articleInvestigadorUniversidad Nacional de Ucayali. Facultad de Ingenieria de Sistemas y de Ingeniería CivilCiencias de la Computaciónhttps://orcid.org/0000-0003-1283-563022481163131399https://purl.org/pe-repo/renati/level#doctorhttps://purl.org/pe-repo/renati/type#trabajoAcademicoORIGINALUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdfapplication/pdf735016https://repositorio.unu.edu.pe/bitstreams/c4785f0e-709c-403e-90fd-aab98200b085/download8702a27b2023a8aa0d09d1f25818a91bMD51TEXTUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdf.txtUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdf.txtExtracted texttext/plain16336https://repositorio.unu.edu.pe/bitstreams/ba95a8f4-9efc-4382-b8e1-e02350baf450/downloadc7c3e8281a435649326ec2b5e45a63d9MD5220.500.14621/5553oai:repositorio.unu.edu.pe:20.500.14621/55532022-07-09 08:00:07.863https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://repositorio.unu.edu.peRepositorio UNUrepositorio@unu.edu.pe
dc.title.es_PE.fl_str_mv Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
title Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
spellingShingle Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
Sandoya, Fernando
Elliptic Curve Cryptography
Encryption
Decryption
Internet of things
Security
Twofish
Algorithm
Ciencias de la Computación
https://purl.org/pe-repo/ocde/ford#5.08.02
title_short Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
title_full Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
title_fullStr Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
title_full_unstemmed Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
title_sort Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
author Sandoya, Fernando
author_facet Sandoya, Fernando
Dhamodharan, D.
Hilario Rivas, Jorge Luis
Choque Flores, Leopoldo
Thaddeus, S.
author_role author
author2 Dhamodharan, D.
Hilario Rivas, Jorge Luis
Choque Flores, Leopoldo
Thaddeus, S.
author2_role author
author
author
author
dc.contributor.author.fl_str_mv Sandoya, Fernando
Dhamodharan, D.
Hilario Rivas, Jorge Luis
Choque Flores, Leopoldo
Thaddeus, S.
dc.subject.es_PE.fl_str_mv Elliptic Curve Cryptography
Encryption
Decryption
Internet of things
Security
Twofish
Algorithm
Ciencias de la Computación
topic Elliptic Curve Cryptography
Encryption
Decryption
Internet of things
Security
Twofish
Algorithm
Ciencias de la Computación
https://purl.org/pe-repo/ocde/ford#5.08.02
dc.subject.ocde.none.fl_str_mv https://purl.org/pe-repo/ocde/ford#5.08.02
description dr@jorgeluishilario.com
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2022-07-01T18:11:21Z
dc.date.available.none.fl_str_mv 2022-07-01T18:11:21Z
dc.date.issued.fl_str_mv 2021
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
format article
dc.identifier.other.es_PE.fl_str_mv Solicitud Email
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.14621/5553
identifier_str_mv Solicitud Email
url https://hdl.handle.net/20.500.14621/5553
dc.language.iso.en_US.fl_str_mv eng
language eng
dc.rights.en_US.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.none.fl_str_mv https://creativecommons.org/licenses/by/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
dc.publisher.es_PE.fl_str_mv Universidad Nacional de Ucayali
dc.publisher.country.none.fl_str_mv PE
dc.source.es_PE.fl_str_mv Universidad Nacional de Ucayali
Repositorio institucional - UNU
dc.source.none.fl_str_mv reponame:UNU-Institucional
instname:Universidad Nacional de Ucayali
instacron:UNU
instname_str Universidad Nacional de Ucayali
instacron_str UNU
institution UNU
reponame_str UNU-Institucional
collection UNU-Institucional
bitstream.url.fl_str_mv https://repositorio.unu.edu.pe/bitstreams/c4785f0e-709c-403e-90fd-aab98200b085/download
https://repositorio.unu.edu.pe/bitstreams/ba95a8f4-9efc-4382-b8e1-e02350baf450/download
bitstream.checksum.fl_str_mv 8702a27b2023a8aa0d09d1f25818a91b
c7c3e8281a435649326ec2b5e45a63d9
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositorio UNU
repository.mail.fl_str_mv repositorio@unu.edu.pe
_version_ 1843349860071243776
score 13.243791
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).