Utilize este identificador para referenciar este registo:
http://hdl.handle.net/10071/36782| Autoria: | Costa, P. Noetzold, D. García Ovejero, R. Martín Esteban, R. Leithardt, V. |
| Editor: | Iglesia, Daniel H. de la Paz Santana, Juan F. de López Rivero, Alfonso J. |
| Data: | 2025 |
| Título próprio: | Prisec II: A comprehensive model for IoT security |
| Título e volume do livro: | Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025) |
| Paginação: | 147 - 158 |
| Referência bibliográfica: | Costa, P., Noetzold, D., García Ovejero, R., Martín Esteban, R., & Leithardt, V. (2025). Prisec II: A comprehensive model for IoT security. In D. H. Iglesia, J. F. Paz Santana, & A. J. López Rivero (Eds.), Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025) (pp. 147-158). Springer. https://doi.org/10.1007/978-3-031-99474-6_13 |
| ISSN: | 2194-5357 |
| ISBN: | 978-3-031-99474-6 |
| DOI (Digital Object Identifier): | 10.1007/978-3-031-99474-6_13 |
| Palavras-chave: | Algorithms Cryptographic cloud Computing Optimization data transmission Efficiency Prisec |
| Resumo: | This study examines data security and efficiency in interconnected IoT devices, focusing on selecting cryptographic algorithms to improve secure data transmission in 5G networks. The proposed model introduces four security levels, each applying different encryption strategies to balance security and performance. Cloud computing is integrated to mitigate computational limitations in IoT devices, optimizing encryption and decryption processes. The study evaluates multiple cryptographic algorithms, analyzing encryption and decryption times, packet throughput, and memory usage. Experimental results demonstrate that the model enables efficient encryption while maintaining security, with AES-256 and XChaCha20 showing stable performance across different packet sizes. The cloud-based implementation improves resource distribution and reduces processing delays. This work contributes a structured cryptographic model adaptable to varying security needs and a performance evaluation of different cryptographic approaches in cloud-integrated environments. |
| Arbitragem científica: | yes |
| Acesso: | Acesso Embargado |
| Aparece nas coleções: | ISTAR-CRI - Comunicações a conferências internacionais |
Ficheiros deste registo:
| Ficheiro | Tamanho | Formato | |
|---|---|---|---|
| conferenceObject_112623.pdf Restricted Access | 660,95 kB | Adobe PDF | Ver/Abrir Request a copy |
Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.












