Internet of Things and Security (IoT) is now prevalent in every aspect of our lives. Moreover, the number of wireless electronic devices which can be controlled remotely has proliferated. However, a range of varied difficulties such as data transfer, energy supply, and security may occur in IoT devices; therefore, it is imperative that the most suitable connection type be chosen for the sake of the efficiency and security of the process. The choice of cryptological keys exerts direct influence on data security, instant data density, and the length of the encryption time, and excess processing power, on the other hand, shortens battery life. This study has been conducted in order to inspect the preferable cryptological keys, for wireless smart-devices equipped with latest technology, in terms of speed and reliability.

1.
Al-Fuqaha
,
M.
Guizani
,
M.
Mohammadi
,
M.
Aledhari
,
M.
Ayyash
, “
Internet of Things: A survey on enabling technologies, protocols, and applications
,”
IEEE Communication surveys & tutorials
vol.
17
, No
4
, fourth quarter, pp.
2347
2376
,
2015
.
2.
D.
Evans
, “The Internet of things: How the next evolution of the Internet is changing everything,”
CISCO
,
San Jose, CA, USA, White Paper
,
2011
.
3.
Aggarwal
,
C. C.
,
Ashish
,
N.
, &
Sheth
,
A.
(
2013
). The Internet of Things: A survey from the data-centric perspective. In
C. C.
Aggarwal
(Ed.),
Managing and mining sensor data
(pp.
383
428
).
US
:
Springer
.
4.
Kushalnagar
N.
,
Montenegro
G.
, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. https://tools.ietf.org/pdf/rfc4919.pdf. Yayın tarihi Ağustos 2008. Erişim tarihi Temmuz 17,
2016
.
5.
Hui
J.
,
Thubert
P.
,
Compression format for IPv6 datagrams over IEEE 802.15. 4-based networks. Yayın tarihi Eylül 2011
.
Erişim tarihi Ağustos
10
,
2016
.
6.
Roman
R.
,
Alcaraz
C.
,
Lopez
J.
,
Sklavos
N.
,
Key management systems for sensor networks in the context of the Internet of Things
,
Comput. Electric. Eng.
,
37
(
2
),
147
159
,
2011
.
7.
Lida
Xu
,
Wu
He
,
Shancang
Li
.,
Internet of Things in Industries: A Survey, Published 2014 in IEEE Transactions on Industrial Informatics
, DOI:
8.
Palattella
M.R.
,
Accettura
N.
,
Vilajosana
X.
,
Standardized protocol stack for the internet of (important) things
,
IEEE Commun. Surv. Tutorials
,
15
(
3
),
1389
1406
,
2013
.
9.
Rahman
R.A.
,
Shah
B.
,
Security analysis of IoT protocols: A focus in CoAP
.
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC
),
IEEE
, Umman, 1-7, 15-16 Mart,
2016
.
10.
Junqing
Zhang
,
Alan
Marshall
,
Roger
Woods
,
Trung Q.
Duong
.,
Design of an OFDM Physical Layer Encryption Scheme
,
IEEE Transactions on Vehicular Technology
(Volume:
66
, Issue:
3
, March
2017
), DOI:
11.
Xiong
X
,
Zheng
K
,
Xu
R
,
Xiang
W
,
Chatzimisios
P.
Low power wide area machine-to-machine networks: Key techniques and prototype
”.
IEEE Communications Magazine
,
53
(
9
),
64
71
,
2015
.
12.
Hayder A. A.
Al-Kashoash
,
Andrew H.
Kemp
. “
Comparison of 6LoWPAN and LPWAN for the Internet of Things
”,
Australian Journal of Electrical and Electronics Engineering
· December
2017
with 5,140 Reads, DOI:
13.
Prodromou
,
Agatoklis
. “
TLS/SSL Explained – Examples of a TLS Vulnerability and Attack, Final Part
”.
2017
. https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/
14.
ZigBee
Alliance
(
2012
).
ZigBee Light Link Standard
.
San Ramon, United States
. Version 1.0, ZigBee Document 11-0037-10.
15.
Nadhem
AlFardan
,
Royal
Holloway
, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven;
Kenneth G.
Paterson
,
Bertram
Poettering
, and
Jacob C.N.
Schuldt
,
Royal Holloway
,
University of London
16.
Maciej
Korczynski
,
Andrzej
Dud
. “
Markov Chain Fingerprinting to Classify Encrypted Traffic
”, DOI: ,
Conference: IEEE INFOCOM 2014
17.
Kohlios
,
C.P.
;
Hayajneh
,
T.
A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
.
Electronics
2018
,
7
,
284
. Journal reference, 2018, 7, 284, DOI:
18.
Shelby
,
Z.
,
Hartke
,
K.
, and
C.
Bormann
, “
The Constrained Application Protocol (CoAP)
”, RFC 7252, DOI , June 2014, <https://www.rfc-editor.org/info/rfc7252>.
This content is only available via PDF.