Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
Descripción del Articulo
dr@jorgeluishilario.com
Autores: | , , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2021 |
Institución: | Universidad Nacional de Ucayali |
Repositorio: | UNU-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.unu.edu.pe:20.500.14621/5553 |
Enlace del recurso: | https://hdl.handle.net/20.500.14621/5553 |
Nivel de acceso: | acceso abierto |
Materia: | Elliptic Curve Cryptography Encryption Decryption Internet of things Security Twofish Algorithm Ciencias de la Computación https://purl.org/pe-repo/ocde/ford#5.08.02 |
id |
RUNU_73f07092bd2197b5d6bb169c65c03690 |
---|---|
oai_identifier_str |
oai:repositorio.unu.edu.pe:20.500.14621/5553 |
network_acronym_str |
RUNU |
network_name_str |
UNU-Institucional |
repository_id_str |
4869 |
spelling |
Sandoya, FernandoDhamodharan, D.Hilario Rivas, Jorge LuisChoque Flores, LeopoldoThaddeus, S.2022-07-01T18:11:21Z2022-07-01T18:11:21Z2021Solicitud Emailhttps://hdl.handle.net/20.500.14621/5553dr@jorgeluishilario.comThe implicit idea of the IoT is to follow client's identity effectively, so the security and protection concerns like theft the information and disturbance of tasks are turning out to be basic issues in the present IoT applications. Aggressor can pick up the access to the system can harm the physical gadgets of IoT can harm the system which bargains the protection and security of IoT. As the IoT gadgets have low memory, less force and data transmission a productive arrangement to give security is required that won't chomp through the resources of IoT. Because of the resource constrained condition in IoT the regular algorithms isn't sufficient to guarantee the information security. So we want a less computational expense as far as force utilization, memory management and more effective cryptography algorithms to offer more information security in IoT. This paper shows the hybrid cryptography security in IoT by embedding of ECC and TwoFish calculation, which gives an enhanced answer for upgrade the security highlights of the IoT with the goal that we can improve the administration therefore achieves growing the trust over the advancement.engUniversidad Nacional de UcayaliPEinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Universidad Nacional de UcayaliRepositorio institucional - UNUreponame:UNU-Institucionalinstname:Universidad Nacional de Ucayaliinstacron:UNUElliptic Curve CryptographyEncryptionDecryptionInternet of thingsSecurityTwofishAlgorithmCiencias de la Computaciónhttps://purl.org/pe-repo/ocde/ford#5.08.02Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Thingsinfo:eu-repo/semantics/articleInvestigadorUniversidad Nacional de Ucayali. Facultad de Ingenieria de Sistemas y de Ingeniería CivilCiencias de la Computaciónhttps://orcid.org/0000-0003-1283-563022481163131399https://purl.org/pe-repo/renati/level#doctorhttps://purl.org/pe-repo/renati/type#trabajoAcademicoORIGINALUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdfapplication/pdf735016https://repositorio.unu.edu.pe/bitstreams/c4785f0e-709c-403e-90fd-aab98200b085/download8702a27b2023a8aa0d09d1f25818a91bMD51TEXTUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdf.txtUNU_SISTEMAS_2021_AC_JORGE_HILARIO_T1.pdf.txtExtracted texttext/plain16336https://repositorio.unu.edu.pe/bitstreams/ba95a8f4-9efc-4382-b8e1-e02350baf450/downloadc7c3e8281a435649326ec2b5e45a63d9MD5220.500.14621/5553oai:repositorio.unu.edu.pe:20.500.14621/55532022-07-09 08:00:07.863https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://repositorio.unu.edu.peRepositorio UNUrepositorio@unu.edu.pe |
dc.title.es_PE.fl_str_mv |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
title |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
spellingShingle |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things Sandoya, Fernando Elliptic Curve Cryptography Encryption Decryption Internet of things Security Twofish Algorithm Ciencias de la Computación https://purl.org/pe-repo/ocde/ford#5.08.02 |
title_short |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
title_full |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
title_fullStr |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
title_full_unstemmed |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
title_sort |
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things |
author |
Sandoya, Fernando |
author_facet |
Sandoya, Fernando Dhamodharan, D. Hilario Rivas, Jorge Luis Choque Flores, Leopoldo Thaddeus, S. |
author_role |
author |
author2 |
Dhamodharan, D. Hilario Rivas, Jorge Luis Choque Flores, Leopoldo Thaddeus, S. |
author2_role |
author author author author |
dc.contributor.author.fl_str_mv |
Sandoya, Fernando Dhamodharan, D. Hilario Rivas, Jorge Luis Choque Flores, Leopoldo Thaddeus, S. |
dc.subject.es_PE.fl_str_mv |
Elliptic Curve Cryptography Encryption Decryption Internet of things Security Twofish Algorithm Ciencias de la Computación |
topic |
Elliptic Curve Cryptography Encryption Decryption Internet of things Security Twofish Algorithm Ciencias de la Computación https://purl.org/pe-repo/ocde/ford#5.08.02 |
dc.subject.ocde.none.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#5.08.02 |
description |
dr@jorgeluishilario.com |
publishDate |
2021 |
dc.date.accessioned.none.fl_str_mv |
2022-07-01T18:11:21Z |
dc.date.available.none.fl_str_mv |
2022-07-01T18:11:21Z |
dc.date.issued.fl_str_mv |
2021 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
dc.identifier.other.es_PE.fl_str_mv |
Solicitud Email |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.14621/5553 |
identifier_str_mv |
Solicitud Email |
url |
https://hdl.handle.net/20.500.14621/5553 |
dc.language.iso.en_US.fl_str_mv |
eng |
language |
eng |
dc.rights.en_US.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.none.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
dc.publisher.es_PE.fl_str_mv |
Universidad Nacional de Ucayali |
dc.publisher.country.none.fl_str_mv |
PE |
dc.source.es_PE.fl_str_mv |
Universidad Nacional de Ucayali Repositorio institucional - UNU |
dc.source.none.fl_str_mv |
reponame:UNU-Institucional instname:Universidad Nacional de Ucayali instacron:UNU |
instname_str |
Universidad Nacional de Ucayali |
instacron_str |
UNU |
institution |
UNU |
reponame_str |
UNU-Institucional |
collection |
UNU-Institucional |
bitstream.url.fl_str_mv |
https://repositorio.unu.edu.pe/bitstreams/c4785f0e-709c-403e-90fd-aab98200b085/download https://repositorio.unu.edu.pe/bitstreams/ba95a8f4-9efc-4382-b8e1-e02350baf450/download |
bitstream.checksum.fl_str_mv |
8702a27b2023a8aa0d09d1f25818a91b c7c3e8281a435649326ec2b5e45a63d9 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
repository.name.fl_str_mv |
Repositorio UNU |
repository.mail.fl_str_mv |
repositorio@unu.edu.pe |
_version_ |
1843349860071243776 |
score |
13.243791 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).