Please use this identifier to cite or link to this item: http://hdl.handle.net/10071/36782
Author(s): Costa, P.
Noetzold, D.
García Ovejero, R.
Martín Esteban, R.
Leithardt, V.
Editor: Iglesia, Daniel H. de la
Paz Santana, Juan F. de
López Rivero, Alfonso J.
Date: 2025
Title: Prisec II: A comprehensive model for IoT security
Book title/volume: Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025)
Pages: 147 - 158
Reference: Costa, P., Noetzold, D., García Ovejero, R., Martín Esteban, R., & Leithardt, V. (2025). Prisec II: A comprehensive model for IoT security. In D. H. Iglesia, J. F. Paz Santana, & A. J. López Rivero (Eds.), Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025) (pp. 147-158). Springer. https://doi.org/10.1007/978-3-031-99474-6_13
ISSN: 2194-5357
ISBN: 978-3-031-99474-6
DOI (Digital Object Identifier): 10.1007/978-3-031-99474-6_13
Keywords: Algorithms
Cryptographic cloud Computing
Optimization data transmission
Efficiency
Prisec
Abstract: This study examines data security and efficiency in interconnected IoT devices, focusing on selecting cryptographic algorithms to improve secure data transmission in 5G networks. The proposed model introduces four security levels, each applying different encryption strategies to balance security and performance. Cloud computing is integrated to mitigate computational limitations in IoT devices, optimizing encryption and decryption processes. The study evaluates multiple cryptographic algorithms, analyzing encryption and decryption times, packet throughput, and memory usage. Experimental results demonstrate that the model enables efficient encryption while maintaining security, with AES-256 and XChaCha20 showing stable performance across different packet sizes. The cloud-based implementation improves resource distribution and reduces processing delays. This work contributes a structured cryptographic model adaptable to varying security needs and a performance evaluation of different cryptographic approaches in cloud-integrated environments.
Peerreviewed: yes
Access type: Embargoed Access
Appears in Collections:ISTAR-CRI - Comunicações a conferências internacionais

Files in This Item:
File SizeFormat 
conferenceObject_112623.pdf
  Restricted Access
660,95 kBAdobe PDFView/Open Request a copy


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.