The security model of interconnected computing devices based on a lightweight encryption scheme for IoT.

Keywords: Internet of Things, lightweight cryptography, encryption, hardware ciphers, cryptographic libraries, key management, resource limitations.

Abstract

Today world, the number of devices connected to the Internet of Things (IoT) is growing rapidly, which creates new challenges in the field of ensuring their security. The article is devoted to the development of a security model for IoT devices, which takes into account the limited computing resources and minimal energy consumption necessary for the effective functioning of cryptographic algorithms. The problem is the lack of universal lightweight cryptographic solutions capable of providing reliable protection in the IoT environment without a significant increase in energy consumption or computing resources. The article presents an analysis of modern research and publications in this field, in particular, the latest developments in the field of lightweight cryptography optimized for IoT devices are considered. Special attention is paid to lightweight cryptographic algorithms that can provide high security with minimal use of resources such as energy and computing power. The proposed model includes both hardware and software solutions for encryption and key management in order to minimize the risks of data compromise. The methods of assessing the effectiveness of protective measures and the models for taking into account resource limitations are being studied. The article also discusses the prospects for using quantum-resistant cryptographic protocols that could become the basis for future IoT security standards. The conclusions emphasize the importance of continuous improvement of protective mechanisms to increase the level of security of IoT technologies, which will contribute to the growth of user trust in these systems and ensure reliable protection of data in global networks. The development and implementation of such lightweight cryptographic solutions are critical for protecting data and ensuring the stable operation of IoT ecosystems in the face of modern cyber threats.

References

1. Marton, A., 2023. State of IoT – spring 2023, report by IoT analytics, safepay systems.
2. Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283-294.
3. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access, 7, 82721-82743.
4. Zaeem, R. N., & Barber, K. S. (2020). The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS), 12(1), 1-20.
5. Easttom, C. (2022). Quantum computing and cryptography. In Modern Cryptography: Applied Mathematics for Encryption and Information Security (pp. 397-407). Cham: Springer International Publishing.

Abstract views: 46
PDF Downloads: 62
Published
2024-06-16
How to Cite
Rozlomii, I., Symonyuk , V., Naumenko , S., & Mykhailovskyi , P. (2024). The security model of interconnected computing devices based on a lightweight encryption scheme for IoT. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (55), 191-198. https://doi.org/10.36910/6775-2524-0560-2024-55-24
Section
Computer science and computer engineering