Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/36782
Autoria: Costa, P.
Noetzold, D.
García Ovejero, R.
Martín Esteban, R.
Leithardt, V.
Editor: Iglesia, Daniel H. de la
Paz Santana, Juan F. de
López Rivero, Alfonso J.
Data: 2025
Título próprio: Prisec II: A comprehensive model for IoT security
Título e volume do livro: Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025)
Paginação: 147 - 158
Referência bibliográfica: Costa, P., Noetzold, D., García Ovejero, R., Martín Esteban, R., & Leithardt, V. (2025). Prisec II: A comprehensive model for IoT security. In D. H. Iglesia, J. F. Paz Santana, & A. J. López Rivero (Eds.), Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025) (pp. 147-158). Springer. https://doi.org/10.1007/978-3-031-99474-6_13
ISSN: 2194-5357
ISBN: 978-3-031-99474-6
DOI (Digital Object Identifier): 10.1007/978-3-031-99474-6_13
Palavras-chave: Algorithms
Cryptographic cloud Computing
Optimization data transmission
Efficiency
Prisec
Resumo: This study examines data security and efficiency in interconnected IoT devices, focusing on selecting cryptographic algorithms to improve secure data transmission in 5G networks. The proposed model introduces four security levels, each applying different encryption strategies to balance security and performance. Cloud computing is integrated to mitigate computational limitations in IoT devices, optimizing encryption and decryption processes. The study evaluates multiple cryptographic algorithms, analyzing encryption and decryption times, packet throughput, and memory usage. Experimental results demonstrate that the model enables efficient encryption while maintaining security, with AES-256 and XChaCha20 showing stable performance across different packet sizes. The cloud-based implementation improves resource distribution and reduces processing delays. This work contributes a structured cryptographic model adaptable to varying security needs and a performance evaluation of different cryptographic approaches in cloud-integrated environments.
Arbitragem científica: yes
Acesso: Acesso Embargado
Aparece nas coleções:ISTAR-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceObject_112623.pdf
  Restricted Access
660,95 kBAdobe PDFVer/Abrir Request a copy


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.