Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations

Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing...

Full description

Saved in:
Bibliographic Details
Main Authors: Dana Simian, Oana-Adriana Ticleanu, Nicolae Constantinescu
Format: Article
Language:English
Published: MDPI AG 2025-03-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/15/6/3048
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850089846221045760
author Dana Simian
Oana-Adriana Ticleanu
Nicolae Constantinescu
author_facet Dana Simian
Oana-Adriana Ticleanu
Nicolae Constantinescu
author_sort Dana Simian
collection DOAJ
description Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing power, such as IoT, the modeling of a security system of the entire structure will have to take into account the fact that some devices have a very low computing power. In this sense, starting from the study of some general models, used in structures of this type, an integrated structure was developed to secure communications and test certain vulnerable components, to calculate a degree of risk that they are maliciously intended. The system was developed with a customized mathematical model, a scheme for propagation and management of cryptographic parameters and a test in a real environment by creating the algorithmic model and implementing it within a structure of a beneficiary.
format Article
id doaj-art-2d31658fdf4b4f8dacc6e0b43ec4a513
institution DOAJ
issn 2076-3417
language English
publishDate 2025-03-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj-art-2d31658fdf4b4f8dacc6e0b43ec4a5132025-08-20T02:42:41ZengMDPI AGApplied Sciences2076-34172025-03-01156304810.3390/app15063048Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT ConfigurationsDana Simian0Oana-Adriana Ticleanu1Nicolae Constantinescu2Faculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaFaculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaFaculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaComputing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing power, such as IoT, the modeling of a security system of the entire structure will have to take into account the fact that some devices have a very low computing power. In this sense, starting from the study of some general models, used in structures of this type, an integrated structure was developed to secure communications and test certain vulnerable components, to calculate a degree of risk that they are maliciously intended. The system was developed with a customized mathematical model, a scheme for propagation and management of cryptographic parameters and a test in a real environment by creating the algorithmic model and implementing it within a structure of a beneficiary.https://www.mdpi.com/2076-3417/15/6/3048ECC key agreementIoT authenticationmalicious user
spellingShingle Dana Simian
Oana-Adriana Ticleanu
Nicolae Constantinescu
Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
Applied Sciences
ECC key agreement
IoT authentication
malicious user
title Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
title_full Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
title_fullStr Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
title_full_unstemmed Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
title_short Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
title_sort deterministic systems for cryptographic primitives used in security models in particular iot configurations
topic ECC key agreement
IoT authentication
malicious user
url https://www.mdpi.com/2076-3417/15/6/3048
work_keys_str_mv AT danasimian deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations
AT oanaadrianaticleanu deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations
AT nicolaeconstantinescu deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations