Author:
Naga Rani Bandaru Venkata,Gayatri Sarman Kaligotla V S H,Dhana Satya Prathap Varma Uddarraju,Prasadaraju Kantheti,Sugumaran S
Abstract
Abstract
There are chances for creative applications when Internet of Things (IoT) devices are integrated with cloud computing (CC) settings, but there are also privacy and data security concerns. In order to overcome these issues, this research suggests lightweight cryptographic methods designed specifically for IoT-enabled CC systems. The limited resources of Internet of Things devices make typical encryption techniques unfeasible. Our goal is to provide efficient, low-resource, secure data transmission techniques using lightweight cryptography between Internet of Things devices and the cloud. These methods are intended to protect confidentiality and integrity, which are necessary for safe protocols of communication in Internet of Things contexts. We suggest combining the 98% processing efficiency of SIMON, a lightweight encryption, with current CC security systems like block chain. By protecting sensitive data without taxing IoT device resources, this integration improves data integrity and accountability. Our method promotes strong data protection in IoT-enabled CC situations by striking a balance between efficiency and security, guaranteeing the longevity and dependability of smart energy systems. IoT-based sustainable smart energy systems employ networked devices to minimize environmental impact, maximize renewable energy sources, and effectively control energy usage. These systems can include energy monitoring devices that track use in real time, smart appliances that modify their operation based on energy availability and cost, and smart grids that balance supply and demand. We can increase the utilization of renewable resources and reduce waste by incorporating IoT technologies into energy infrastructure.
Reference17 articles.
1. Lightweight cryptography: a solution to secure IoT;Dhanda;Wireless Personal Communications,2020
2. A survey of lightweight cryptographic algorithms for iot-based applications. In;Shah,2019
3. A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation;Hosseinzadeh;Advances in Computer Science: an International Journal,2016
4. Related-key attack on the full HIGHT. In;Koo,2011
5. A lightweight authentication and secure data access between fog and IoT user;Murugesan;International Journal of Electronic Business,2021