B. Kannan, P. Solainayagi, H. Azath, Subbiah Murugan, C. Srinivasan
{"title":"在军事应用中使用加密的支持物联网的嵌入式系统中的安全通信","authors":"B. Kannan, P. Solainayagi, H. Azath, Subbiah Murugan, C. Srinivasan","doi":"10.1109/ICECAA58104.2023.10212400","DOIUrl":null,"url":null,"abstract":"Real-time monitoring and analysis of data from various sources have been made possible due to the growth of Internet of Things (IoT)-enabled embedded systems in military applications. This has allowed improved situational awareness and the identification of potential threats. However, it is essential that the communication between these systems to be protected against illegal access and intervention to maintain their integrity. This research study investigates whether or not it is possible to have encrypted communication in embedded systems that make use of the IoT for military purposes. It gives an overview of the many security protocols and algorithms that may be used to secure communication, along with the problems and constraints that such protocols and algorithms provide. Case studies and examples of how secure transmission has been deployed in real-world military applications are covered along with the lessons learned and best practices for moving forward with the technology's development. This article emphasizes the significance of encrypted communication in military applications and its role in protecting the safety and security of soldiers and equipment.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure Communication in IoT-enabled Embedded Systems for Military Applications using Encryption\",\"authors\":\"B. Kannan, P. Solainayagi, H. Azath, Subbiah Murugan, C. Srinivasan\",\"doi\":\"10.1109/ICECAA58104.2023.10212400\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Real-time monitoring and analysis of data from various sources have been made possible due to the growth of Internet of Things (IoT)-enabled embedded systems in military applications. This has allowed improved situational awareness and the identification of potential threats. However, it is essential that the communication between these systems to be protected against illegal access and intervention to maintain their integrity. This research study investigates whether or not it is possible to have encrypted communication in embedded systems that make use of the IoT for military purposes. It gives an overview of the many security protocols and algorithms that may be used to secure communication, along with the problems and constraints that such protocols and algorithms provide. Case studies and examples of how secure transmission has been deployed in real-world military applications are covered along with the lessons learned and best practices for moving forward with the technology's development. This article emphasizes the significance of encrypted communication in military applications and its role in protecting the safety and security of soldiers and equipment.\",\"PeriodicalId\":114624,\"journal\":{\"name\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA58104.2023.10212400\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Communication in IoT-enabled Embedded Systems for Military Applications using Encryption
Real-time monitoring and analysis of data from various sources have been made possible due to the growth of Internet of Things (IoT)-enabled embedded systems in military applications. This has allowed improved situational awareness and the identification of potential threats. However, it is essential that the communication between these systems to be protected against illegal access and intervention to maintain their integrity. This research study investigates whether or not it is possible to have encrypted communication in embedded systems that make use of the IoT for military purposes. It gives an overview of the many security protocols and algorithms that may be used to secure communication, along with the problems and constraints that such protocols and algorithms provide. Case studies and examples of how secure transmission has been deployed in real-world military applications are covered along with the lessons learned and best practices for moving forward with the technology's development. This article emphasizes the significance of encrypted communication in military applications and its role in protecting the safety and security of soldiers and equipment.