Cryptography Techniques and Internet of Things Applications – A Modern Survey

Document Type : Primary Research paper

Authors

1 Robotics and Automation, Sri Ramakrishna Engineering College, Coimbatore,641022, India.

2 Electronics and Instrumentation Engg., Sri Ramakrishna Engineering College, Coimbatore,641022, India.

3 Electronic Engineering, University of KwaZulu-Natal, Durban, 4041, SouthAfrica.

4 Assistant Professor (Sr.G) Mechanical Engineering, KPR Institute of Engineering and Technology, Coimbatore, 641407, India.

Abstract

Cryptography's single most essential application in the internet of things is securing communication routes. Here are a few examples of how current encryption can help make the Internet of Things a safer and more trustworthy place. In this paper, Certain Investigations on Cryptography Techniques and Internet of Things Applications are been proposed. In cryptographic techniques, Verifiable computing based on proofs and verifiable computing based on replication, FPGA, Multivariate Cubic MC problem, image cryptosystem, CB-PBS scheme, LB-2PAKA protocol, MECC and DLMNN, SKMA-SC technique, EC-ACS Scheme, IoT cryptographic system, ECC-PKI, ESEAP, GEDMs, hybrid security strategy HS2, query system based on proxy re-encryption, IoT network security using post-quantum cryptography techniques and IoT Applications likea combination of the Whale Optimization Algorithm and the Moth Flame Optimization (MFO), Shodan, Packet sniffing applications and network mapping tools, LAM-CIoT, LoRa+, LoRa Gateway by using chirp spectrum modulation scheme, RECLB algorithm, twin Peaks, WoT Store, a centralised inconspicuousFor real-time monitoring of a large population, an IoT-based device-type invariant fall detection and rescue system, In the standard model, decentralised attribute-based encryption is used, as well as an authentication system, CWD-WPT charging systems on a VANET network in a cloud and fog computing environment, CAPODAZ, SCF-CLSPE scheme, IoT cryptographic system, MQTT, Multi-Dimensional Access Control (MD-AC) scheme, IoT network security using post-quantum cryptography techniques, lightweight AKA scheme and ENPKESS method.

Keywords