Smriti Kumari, Pragya Snehil, Saurav Kumar, P. Kumari, P. Kumari, Subashis Karmakar
{"title":"面向物联网的轻量级加密算法研究:人工智能、物联网、智慧城市与应用最新趋势国际会议(ICAISC-2020)","authors":"Smriti Kumari, Pragya Snehil, Saurav Kumar, P. Kumari, P. Kumari, Subashis Karmakar","doi":"10.2139/ssrn.3611487","DOIUrl":null,"url":null,"abstract":"Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.","PeriodicalId":102139,"journal":{"name":"Other Topics Engineering Research eJournal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Study on Lightweight Cryptography Algorithm for Internet of Things: International conference on Recent Trends in Artificial Intelligence, IOT, Smart Cities & Applications (ICAISC-2020),\",\"authors\":\"Smriti Kumari, Pragya Snehil, Saurav Kumar, P. Kumari, P. Kumari, Subashis Karmakar\",\"doi\":\"10.2139/ssrn.3611487\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.\",\"PeriodicalId\":102139,\"journal\":{\"name\":\"Other Topics Engineering Research eJournal\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Other Topics Engineering Research eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3611487\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Other Topics Engineering Research eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3611487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on Lightweight Cryptography Algorithm for Internet of Things: International conference on Recent Trends in Artificial Intelligence, IOT, Smart Cities & Applications (ICAISC-2020),
Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.