IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Advanced Encryption Standard With Randomized Round Keys for Communication Security in IoT Networks

Advanced Encryption Standard With Randomized Round Keys for Communication Security in IoT Networks
View Sample PDF
Author(s): Ishpal Singh Gill (Namibia University of Science and Technology, Namibia)and Dharm Singh Jat (Namibia University of Science and Technology, Namibia)
Copyright: 2019
Pages: 9
Source title: The IoT and the Next Revolutions Automating the World
Source Author(s)/Editor(s): Dinesh Goyal (Poornima Institute of Engineering & Technology, India), S. Balamurugan (QUANTS Investment Strategy & Consultancy Services, India), Sheng-Lung Peng (National Dong Hwa University, Taiwan)and Dharm Singh Jat (Namibia University of Science and Technology, Namibia)
DOI: 10.4018/978-1-5225-9246-4.ch017

Purchase

View Advanced Encryption Standard With Randomized Round Keys for Communication Security in IoT Networks on the publisher's website for pricing and purchasing information.

Abstract

Internet of things (IoT) is a rapidly emerging architecture connecting smart devices all across the world in various fields like smart homes, smart cities, health sector, security, etc. Security is a very important aspect of IoT. As more and more devices are connecting to the Internet, it becomes a lucrative target for hackers. The communication between the various devices, nodes, and between nodes and the cloud, needs to be secured. A combination of public and private key cryptography systems is used to secure the IoT networks. The Advanced Encryption Standard (AES) is used for encrypting the data in transit. However, the AES is known to be prone to brute force attacks, side channel attacks, and other forms of cryptanalysis. This chapter proposes a more secure AES algorithm with randomised round keys, which provides better security with negligible overheads, and is ideal for use in IoT networks.

Related Content

Nalini M.. © 2023. 22 pages.
Balachandar S., Chinnaiyan R.. © 2023. 19 pages.
V. A. Velvizhi, G. Senbagavalli, S. Malini. © 2023. 29 pages.
Amuthan Nallathambi, Kannan Nova. © 2023. 25 pages.
Amuthan Nallathambi, Sivakumar N., Velrajkumar P.. © 2023. 17 pages.
Nayana Hegde, Sunilkumar S. Manvi. © 2023. 18 pages.
Udayakumar K., Ramamoorthy S., Poorvadevi R.. © 2023. 26 pages.
Body Bottom