A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Performance Analysis of Light Weight Security Algorithms for Resource Constrained Devices
2019
Zenodo
With the advent of technologies like Internet of Things (IoT) and Machine to Machine (M2M) communication, a huge quantity of data is generated every day. Being a distributed system of constrained devices, this data needs to be communicated securely without wasting the resources of constrained devices. Therefore there is need of appropriate lightweight security protocols to avoid the security threat to future internet. In this context, a study of lightweight security algorithms is presented in
doi:10.5281/zenodo.2602959
fatcat:pzvstl6lpnf7zmomcibcfmlvsm