Archive
SCIENTIFIC WORK - 2025 SCIENTIFIC WORK - 2024 SCIENTIFIC WORK - 2023 SCIENTIFIC WORK - 2022 SCIENTIFIC WORK - 2021 SCIENTIFIC WORK - 2020 SCIENTIFIC WORK - 2019 SCIENTIFIC WORK - 2018 SCIENTIFIC WORK - 2017 SCIENTIFIC WORK - 2016 SCIENTIFIC WORK - 2015 SCIENTIFIC WORK - 2014 SCIENTIFIC WORK - 2013 SCIENTIFIC WORK - 2012 SCIENTIFIC WORK - 2011 SCIENTIFIC WORK - 2010 SCIENTIFIC WORK - 2009 SCIENTIFIC WORK - 2008 SCIENTIFIC WORK - 2007

DOI:  https://doi.org/10.36719/2663-4619/115/338-341

Jabir Abbasov

Azerbaijan Technical University

https://orcid.org/0009-0001-3588-4075

cabir.abbasov22@gmail.com

Agshin Nasirzadeh

Azerbaijan Technical University

https://orcid.org/0009-0007-1027-2869

aqshin.nasirzade@outlook.com

Orkhan Guluzadeh

Azerbaijan Technical University

https://orcid.org/0009-0006-0335-3516

orxanguluzada@gmail.com

 

Elaboration of Encryption Method for IoT Securıty

 

Abstract

 

The rapid development of Internet of Things (IoT) technologies necessitates the implementation of effective and resource-efficient encryption methods to ensure the security of these devices. Since IoT devices typically possess limited computational power, memory, and energy resources, traditional encryption methods may not yield optimal results in this context. Therefore, the use of lightweight and efficient cryptographic algorithms has become a priority.

As a result, the development of encryption methods for IoT security requires the application of lightweight and robust cryptographic algorithms that can provide effective protection against both current and emerging threats, while also taking into account the resource constraints of IoT devices.

Additionally, eSIM technology offers a secure and tamper-resistant solution for authentication and data transmission in IoT devices.

In conclusion, the implementation of encryption methods for IoT security necessitates the use of lightweight and powerful cryptographic algorithms that ensure effective defense, considering the limitations in device resources.

Keywords: IoT security, encryption algorithms, lightweight cryptography, symmetric encryption, asymmetric encryption, elliptic curve cryptography (ECC), Twofish algorithm


Views: 75