2 research outputs found

    Efficient Security Algorithm for Power Constrained IoT Devices

    Get PDF
    Internet of Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques, due to their constrained nature. Classical security algorithms which are built on complex cryptographic functions often require a level of processing that low power IoT devices are incapable to effectively achieve due to limited power and processing resources. Consequently, the option for constrained IoT devices lies in either developing new security schemes or modifying existing ones to be more suitable for constrained IoT devices. In this work, an Efficient security Algorithm for Constrained IoT devices; based on the Advanced Encryption Standard is proposed. We present a cryptanalytic overview of the consequence of complexity reduction together with a supporting mathematical justification, and provisioned a secure element (ATECC608A) as a trade-off. The ATECC608A doubles for authentication and guarding against implementation attacks on the associated IoT device (ARM Cortex M4 microprocessor) in line with our analysis. The software implementation of the efficient algorithm for constrained IoT devices shows up to 35% reduction in the time it takes to complete the encryption of a single block (16bytes) of plain text, in comparison to the currently used standard AES-128 algorithm, and in comparison to current results in literature at 26.6

    Public Service Communications Satellite User Requirements Workshop

    Get PDF
    Information on user requirements for public service communications was acquired to provide the basis of a study to determine the optimum satellite system to satisfy user requirements. The concept for such a system is described: Topics discussed included requirements for data and message services, elementary and secondary education, extension and continuing education, environmental communications, library services, medical education, medical services, public broadcasting, public safety, religious applications, state and local communications, and voluntary services. Information was also obtained on procedures to follow to make the transfer to commercial services
    corecore