Recent trends of Internet of Things (a network-connected wirelessly between smart devices and the Internet) and ubiquitous/pervasive computing require everything to be IP addressable and accessed on the Internet. Internet of Things (IoT), a rapidly developing market which not only connects people and things but also billions of devices and smart objects. A steady increase in security vulnerabilities has been witnessed with the widening of the Internet of Things. The accuracy and reliability of data also referred to as data integrity makes certain that data is not modified while its transfer, storage, or retrieval. For the verification of data integrity, generally, hash functions are used. In order to provide the real-time or near real-time checking of data integrity, hardware implementation of cryptographic hash functions is necessary for the Internet of Things. The IoT world constitutes billions of devices that can sense the data, share information, and communicate it over Internet Protocol (IP) network. The present work presents an implementation of the Secure Hash Algorithm—3 (SHA–3) on NS2 and undertakes power analysis of the algorithm for the Internet of Things applications.
CITATION STYLE
Tariq Banday, M., & Masoodi, I. S. (2021). Power Consumption Estimation of SHA-3 for the Internet of Things Applications. In Lecture Notes in Mechanical Engineering (pp. 1025–1033). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-5463-6_91
Mendeley helps you to discover research relevant for your work.