DOI: https://doi.org/10.36719/2663-4619/115/338-341
Jabir Abbasov
Azerbaijan Technical University
https://orcid.org/0009-0001-3588-4075
cabir.abbasov22@gmail.com
Agshin Nasirzadeh
Azerbaijan Technical University
https://orcid.org/0009-0007-1027-2869
aqshin.nasirzade@outlook.com
Orkhan Guluzadeh
Azerbaijan Technical University
https://orcid.org/0009-0006-0335-3516
orxanguluzada@gmail.com
Elaboration of Encryption Method for IoT Securıty
Abstract
The rapid development of Internet of Things (IoT) technologies necessitates the implementation of effective and resource-efficient encryption methods to ensure the security of these devices. Since IoT devices typically possess limited computational power, memory, and energy resources, traditional encryption methods may not yield optimal results in this context. Therefore, the use of lightweight and efficient cryptographic algorithms has become a priority.
As a result, the development of encryption methods for IoT security requires the application of lightweight and robust cryptographic algorithms that can provide effective protection against both current and emerging threats, while also taking into account the resource constraints of IoT devices.
Additionally, eSIM technology offers a secure and tamper-resistant solution for authentication and data transmission in IoT devices.
In conclusion, the implementation of encryption methods for IoT security necessitates the use of lightweight and powerful cryptographic algorithms that ensure effective defense, considering the limitations in device resources.
Keywords: IoT security, encryption algorithms, lightweight cryptography, symmetric encryption, asymmetric encryption, elliptic curve cryptography (ECC), Twofish algorithm