Power Consumption Estimation of SHA-3 for the Internet of Things Applications

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent trends of Internet of Things (a network-connected wirelessly between smart devices and the Internet) and ubiquitous/pervasive computing require everything to be IP addressable and accessed on the Internet. Internet of Things (IoT), a rapidly developing market which not only connects people and things but also billions of devices and smart objects. A steady increase in security vulnerabilities has been witnessed with the widening of the Internet of Things. The accuracy and reliability of data also referred to as data integrity makes certain that data is not modified while its transfer, storage, or retrieval. For the verification of data integrity, generally, hash functions are used. In order to provide the real-time or near real-time checking of data integrity, hardware implementation of cryptographic hash functions is necessary for the Internet of Things. The IoT world constitutes billions of devices that can sense the data, share information, and communicate it over Internet Protocol (IP) network. The present work presents an implementation of the Secure Hash Algorithm—3 (SHA–3) on NS2 and undertakes power analysis of the algorithm for the Internet of Things applications.

Cite

CITATION STYLE

APA

Tariq Banday, M., & Masoodi, I. S. (2021). Power Consumption Estimation of SHA-3 for the Internet of Things Applications. In Lecture Notes in Mechanical Engineering (pp. 1025–1033). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-5463-6_91

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free