9 research outputs found
Comparative Study of Keccak SHA-3 Implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for im-
plementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has
spawned numerous implementations across diverse platforms and technologies. This research aims
to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. Our
study encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid)
solutions. We assess the strengths, weaknesses, and performance metrics of each approach. Critical
factors, including computational efficiency, scalability, and flexibility, are evaluated across differ-
ent use cases. We investigate how each implementation performs in terms of speed and resource
utilization. This research aims to improve the knowledge of cryptographic systems, aiding in the
informed design and deployment of efficient cryptographic solutions. By providing a comprehensive
overview of SHA-3 implementations, this study offers a clear understanding of the available options
and equips professionals and researchers with the necessary insights to make informed decisions in
their cryptographic endeavors
PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain
With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data. Analyzing the data obtained from these applications, one can infer personal information about each user. Considering this, it is clear that ensuring privacy in this type of application is essential. To guarantee privacy various solutions exist, one of them is UbiPri middleware. This paper presents a decentralized implementation of UbiPri middleware using the Ethereum blockchain. Smart contracts were used in conjunction with a communication gateway and a distributed storage service to ensure users privacy. The results obtained show that the implementation of this work ensures privacy at different levels, data storage security, and performance regarding scalability in the Internet of Things environments.info:eu-repo/semantics/publishedVersio
Survey of smart parking systems
The large number of vehicles constantly seeking access to congested areas in cities means that finding a public parking place is often difficult and causes problems for drivers and citizens alike. In this context, strategies that guide vehicles from one point to another, looking for the most optimal path, are needed. Most contributions in the literature are routing strategies that take into account different criteria to select the optimal route required to find a parking space. This paper aims to identify the types of smart parking systems (SPS) that are available today, as well as investigate the kinds of vehicle detection techniques (VDT) they have and the algorithms or other methods they employ, in order to analyze where the development of these systems is at today. To do this, a survey of 274 publications from January 2012 to December 2019 was conducted. The survey considered four principal features: SPS types reported in the literature, the kinds of VDT used in these SPS, the algorithms or methods they implement, and the stage of development at which they are. Based on a search and extraction of results methodology, this work was able to effectively obtain the current state of the research area. In addition, the exhaustive study of the studies analyzed allowed for a discussion to be established concerning the main difficulties, as well as the gaps and open problems detected for the SPS. The results shown in this study may provide a base for future research on the subject.Fil: Diaz Ogás, Mathias Gabriel. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; ArgentinaFil: Fabregat Gesa, Ramon. Universidad de Girona; EspañaFil: Aciar, Silvana Vanesa. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; Argentin
loTsafe: Método y sistema de comunicaciones seguras para ecosistemas loT
La presente tesis se desarrolla en el sector de las telecomunicaciones y está relacionada particularmente con el campo de la Ingeniería Telemática. De forma más específica, el trabajo persigue diseñar y validar una tecnología de red mejorada de comunicación segura que pueda constituirse como alternativa a las existentes actualmente en determinados escenarios. El objetivo primario de esta red es desacoplar la seguridad de las aplicaciones de los dispositivos IoT a partir de la definición de contextos de seguridad, y facilitar las comunicaciones entre procesos remotos de forma cuasi-transparente. Estos contextos se configuran a partir de la separación de privilegios de entornos de tipo Portable Operating System Interface (POSIX), junto con marcado y filtrado de paquetes locales Internet Protocol (IP). Esta configuración se puede implementar fácilmente aprovechando el protocolo Secure Socket Shell (SSH) y tomando ciertas ideas de Multi Protocol Label Switching (MPLS), pero también de conmutación de circuitos. El campo inmediato de aplicación abarca las infraestructuras y ecosistemas del Internet de las Cosas (IoT) que cuenten con dispositivos POSIX con capacidad para soportar SSH, algo bastante factible en una mayoría de los entornos IoT. Los principales beneficios de esta solución persiguen acortar los tiempos de desarrollo, facilitar la conectividad y simplificar el mantenimiento y las actualizaciones de seguridad. <br /