Proceedings of the Vth International workshop "Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018)

Secure Communication Technology for Devices with Limited Resources

Authors
Nikita Vysotskiy, Amir Makhmutov, Konstantin Mironov, Marcus Meisel, Thilo Sauter
Corresponding Author
Nikita Vysotskiy
Available Online August 2018.
DOI
10.2991/iwci-18.2018.36How to use a DOI?
Keywords
Wireless sensor networks, communication, symmetric cryptography, microcontrollers
Abstract

In this article, we present a proposal for a secure data transmission technology. This technology can be used to build various low-power wireless networks, for example, in smart home systems, industrial wireless sensor networks, communication networks of Smart Grids. The peculiarity of such networks is that the devices from which they consist do not have sufficient power to support execution of asymmetric crypto algorithms. In the proposed architecture, cryptographic protection of data is provided by using exclusively symmetric crypto algorithms.

Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the Vth International workshop "Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018)
Series
Advances in Intelligent Systems Research
Publication Date
August 2018
ISBN
978-94-6252-544-3
ISSN
1951-6851
DOI
10.2991/iwci-18.2018.36How to use a DOI?
Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Nikita Vysotskiy
AU  - Amir Makhmutov
AU  - Konstantin Mironov
AU  - Marcus Meisel
AU  - Thilo Sauter
PY  - 2018/08
DA  - 2018/08
TI  - Secure Communication Technology for Devices with Limited Resources
BT  - Proceedings of the Vth International workshop "Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018)
PB  - Atlantis Press
SP  - 207
EP  - 210
SN  - 1951-6851
UR  - https://doi.org/10.2991/iwci-18.2018.36
DO  - 10.2991/iwci-18.2018.36
ID  - Vysotskiy2018/08
ER  -