Low-cost client-side encryption and secure Internet of things (IoT) provisioning

Joseph MAMVONG , Gokop GOTENG , Yue GAO

Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (6) : 166824

PDF (2290KB)
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (6) : 166824 DOI: 10.1007/s11704-022-1256-9
Information Security
LETTER

Low-cost client-side encryption and secure Internet of things (IoT) provisioning

Author information +
History +
PDF (2290KB)

Graphical abstract

Cite this article

Download citation ▾
Joseph MAMVONG, Gokop GOTENG, Yue GAO. Low-cost client-side encryption and secure Internet of things (IoT) provisioning. Front. Comput. Sci., 2022, 16(6): 166824 DOI:10.1007/s11704-022-1256-9

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Aldossary S , Allen W . Data security, privacy, availability and integrity in cloud computing: issues and current solutions. International Journal of Advanced Computer Science and Applications, 2016, 7( 4): 485– 498

[2]

Ali O Ishak M K Wuttisittikulkij L Maung T Z B. IoT devices and edge gateway provisioning, realtime analytics for simulated and virtually emulated devices. In: Proceedings of 2020 International Conference on Electronics, Information, and Communication (ICEIC). 2020, 1− 5

[3]

Sahu A K Sharma S Tripathi S S Singh K N. A study of authentication protocols in internet of things. In: Proceedings of 2019 International Conference on Information Technology (ICIT). 2019, 217− 221

[4]

Deng H , Qin Z , Sha L , Yin H . A flexible privacy-preserving data sharing scheme in cloud-assisted IoT. IEEE Internet of Things Journal, 2020, 7( 12): 11601– 11611

[5]

Liu L , Wang H , Zhang Y . Secure IoT data outsourcing with aggregate statistics and fine-grained access control. IEEE Access, 2020, 8: 95057– 95067

[6]

Mamvong J N , Goteng G L , Zhou B , Gao Y . Efficient security algorithm for power-constrained IoT devices. IEEE Internet of Things Journal, 2021, 8( 7): 5498– 5509

[7]

Jangra M , Singh B . Performance analysis of CLEFIA and present lightweight block ciphers. Journal of Discrete Mathematical Sciences and Cryptography, 2019, 22( 8): 1489– 1499

RIGHTS & PERMISSIONS

The Author(s) 2022. This article is published with open access at link.springer.com and journal.hep.com.cn

AI Summary AI Mindmap
PDF (2290KB)

Supplementary files

Highlights

Supplementary materials 1

Supplementary materials 2

1499

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/