Exploring Current Encryption Technologies in Iot and Their Impact on Data Security

Authors

  • Mohamed Ayari Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Atef Gharbi Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Yamen El Touati Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Zeineb Klai Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Khaled Kefi Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Abdulsamad Ebrahim Yahya Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.
  • Akil El Kamel Faculty of Computing and Information Technology, Northern Border University –Kingdom of Saudi Arabia.

Keywords:

Internet of Things (IoT), Encryption Technologies, Data Security, Scalability, Comparative Analysis.

Abstract

This study systematically assesses encryption technologies in the context of the Internet of Things (IoT), with a specific emphasis on their ability to protect device data and reduce privacy vulnerabilities. This research utilizes comparative analysis and case studies to examine the strengths and limits of symmetric and asymmetric encryption algorithms, as well as hash functions, in various IoT applications. The findings highlight significant challenges associated with scalability and limitations in resources. Given these observations, the paper suggests future avenues for research that aim to enhance encryption technology in order to effectively address the changing requirements of IoT security.

Downloads

Published

2024-08-15

How to Cite

Mohamed Ayari, Atef Gharbi, Yamen El Touati, Zeineb Klai, Khaled Kefi, Abdulsamad Ebrahim Yahya, & Akil El Kamel. (2024). Exploring Current Encryption Technologies in Iot and Their Impact on Data Security. International Journal of Communication Networks and Information Security (IJCNIS), 16(1 (Special Issue), 838–848. Retrieved from https://ijcnis.org/index.php/ijcnis/article/view/6906