Internet of Things and Security (IoT) is now prevalent in every aspect of our lives. Moreover, the number of wireless electronic devices which can be controlled remotely has proliferated. However, a range of varied difficulties such as data transfer, energy supply, and security may occur in IoT devices; therefore, it is imperative that the most suitable connection type be chosen for the sake of the efficiency and security of the process. The choice of cryptological keys exerts direct influence on data security, instant data density, and the length of the encryption time, and excess processing power, on the other hand, shortens battery life. This study has been conducted in order to inspect the preferable cryptological keys, for wireless smart-devices equipped with latest technology, in terms of speed and reliability.
Skip Nav Destination
Article navigation
2 April 2019
INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2018)
31 July–6 August 2018
Istanbul, Turkey
Research Article|
April 02 2019
Encryption protocols on wireless IoT tools
Onder Sahinaslan
Onder Sahinaslan
Maltepe University, Information Technology
, Istanbul, Turkey
Search for other works by this author on:
AIP Conf. Proc. 2086, 030036 (2019)
Citation
Onder Sahinaslan; Encryption protocols on wireless IoT tools. AIP Conf. Proc. 2 April 2019; 2086 (1): 030036. https://doi.org/10.1063/1.5095121
Download citation file:
Citing articles via
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Related Content
Cryptographic methods and development stages used throughout history
AIP Conf. Proc. (April 2019)
Cross-object information security: A study on new generation encryption
AIP Conf. Proc. (April 2019)
Computationally efficient method for determining averaged distribution of differentials for pseudo-dynamic substitutions
AIP Conference Proceedings (April 2018)
Modified advanced encryption standard using cipher based message authentication code algorithm
AIP Conference Proceedings (May 2022)
Algorithm analysis of multi keyword rank searching using tree method upon encrypted cloud data
AIP Conf. Proc. (May 2020)