当前位置: X-MOL 学术IETE J. Res. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
IETE Journal of Research ( IF 1.5 ) Pub Date : 2021-08-22 , DOI: 10.1080/03772063.2021.1966844
Y. Justindhas 1 , P. Jeyanthi 1
Affiliation  

Monitoring the farm field data parameters is one of the important criteria for farmers to keep track of the cultivations and its progress. Internet of Things (IoT) powered system can be implemented in the farm field, with the help of sensors to sense the data from the farm field in the Real-Time cloud. The data collected at the farm field can be accepted after proper authentication from the farmer. Because of heterogeneous and dynamic nature of IoT network, it poses a tremendous threat to security and privacy. Authentication is one of the IoT environment's most demanding security requirements, where users can straightforwardly get to data from any sort of gadgets; we need to implement a mutual authentication mechanism between user and the gadgets. This paper illustrates how the protection of the message stage is achieved in IoT associations and presents an algorithm to identify the right cryptographic algorithm based on the value of device parameters. Various cryptographic algorithms are also assessed which are appropriate for the task and also assesses the algorithm operation time when processing larger messages. Tests with respect to pre-defined measurements are conducted and the measurements are analyzed by comparing the outcomes. At the end of the paper, all outcomes and analyzes are deciphered.



中文翻译:

使用轻量级加密技术通过集成实时云监控智能现场数据的物联网 (IoT) 安全模型

监测农田数据参数是农民跟踪耕作及其进度的重要标准之一。物联网(IoT)驱动的系统可以在农田中实施,借助传感器来感知实时云中农田的数据。在农田采集的数据经过农民的适当认证后可以被接受。由于物联网网络的异构性和动态性,它对安全和隐私构成了巨大的威胁。身份验证是物联网环境中最苛刻的安全要求之一,用户可以直接从任何类型的小工具获取数据;我们需要在用户和小工具之间实现相互身份验证机制。本文说明了如何在物联网关联中实现消息阶段的保护,并提出了一种基于设备参数值识别正确加密算法的算法。还评估适合该任务的各种加密算法,并评估处理较大消息时的算法运行时间。进行针对预定义测量的测试,并通过比较结果来分析测量结果。在论文的最后,所有的结果和分析都被破译。进行针对预定义测量的测试,并通过比较结果来分析测量结果。在论文的最后,所有的结果和分析都被破译。进行针对预定义测量的测试,并通过比较结果来分析测量结果。在论文的最后,所有的结果和分析都被破译。

更新日期:2021-08-22
down
wechat
bug