{"title":"结合轻量级加密方法保护物联网网络","authors":"G. Rao, K. Venkatesan, Allanki Sanyasi Rao","doi":"10.58599/ijsmem.2023.1704","DOIUrl":null,"url":null,"abstract":"The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Combining Lightweight Encryption Methods to Secure IoT Networks\",\"authors\":\"G. Rao, K. Venkatesan, Allanki Sanyasi Rao\",\"doi\":\"10.58599/ijsmem.2023.1704\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o\",\"PeriodicalId\":103282,\"journal\":{\"name\":\"International Journal of Scientific Methods in Engineering and Management\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific Methods in Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58599/ijsmem.2023.1704\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Methods in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58599/ijsmem.2023.1704","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Combining Lightweight Encryption Methods to Secure IoT Networks
The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o