IoT

Comparison of aead-algorithms for embedded systems іnternet of things

The article compares the performance and memory requirements of AES-GCM and ChaCha20Poly1305 AED encryption solutions for typical 8/16/32-bit embedded low-end processors in the Internet of Things device with different approaches to providing tolerance to Timing Attacks and Simple Power Analysis Attacks. Particular attention is given to the low-level multiplication implementation in GF(2128) with constant execution time as a key GCM operation, since low-end processors do not have ready instructions for carry-less multiplication.

GDP in Value as a Measure for Evaluating Annual Data Flow Increase on IoT

The article deals with the problem of assessing the primary data load on the IOT, generated by the year. GDP in the money presentation has been used to estimate the amount of information that enters the network directly from things. Having advanced the postulate that the amount of data emanating from a thing is proportional to the product of its mass (thing) by its specific orderliness, it is concluded that it is possible to use a volume of the generated order principle. Dual model allowing to estimate objective thing’s prices, has been proposed

Problems of privacy and security in cyber physical systems of intellectual houses

Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny.