Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-03-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/15/6/3048 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850089846221045760 |
|---|---|
| author | Dana Simian Oana-Adriana Ticleanu Nicolae Constantinescu |
| author_facet | Dana Simian Oana-Adriana Ticleanu Nicolae Constantinescu |
| author_sort | Dana Simian |
| collection | DOAJ |
| description | Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing power, such as IoT, the modeling of a security system of the entire structure will have to take into account the fact that some devices have a very low computing power. In this sense, starting from the study of some general models, used in structures of this type, an integrated structure was developed to secure communications and test certain vulnerable components, to calculate a degree of risk that they are maliciously intended. The system was developed with a customized mathematical model, a scheme for propagation and management of cryptographic parameters and a test in a real environment by creating the algorithmic model and implementing it within a structure of a beneficiary. |
| format | Article |
| id | doaj-art-2d31658fdf4b4f8dacc6e0b43ec4a513 |
| institution | DOAJ |
| issn | 2076-3417 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Applied Sciences |
| spelling | doaj-art-2d31658fdf4b4f8dacc6e0b43ec4a5132025-08-20T02:42:41ZengMDPI AGApplied Sciences2076-34172025-03-01156304810.3390/app15063048Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT ConfigurationsDana Simian0Oana-Adriana Ticleanu1Nicolae Constantinescu2Faculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaFaculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaFaculty of Sciences, Lucian Blaga University of Sibiu, Victoriei Bd., No. 10, 550024 Sibiu, RomaniaComputing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing power, such as IoT, the modeling of a security system of the entire structure will have to take into account the fact that some devices have a very low computing power. In this sense, starting from the study of some general models, used in structures of this type, an integrated structure was developed to secure communications and test certain vulnerable components, to calculate a degree of risk that they are maliciously intended. The system was developed with a customized mathematical model, a scheme for propagation and management of cryptographic parameters and a test in a real environment by creating the algorithmic model and implementing it within a structure of a beneficiary.https://www.mdpi.com/2076-3417/15/6/3048ECC key agreementIoT authenticationmalicious user |
| spellingShingle | Dana Simian Oana-Adriana Ticleanu Nicolae Constantinescu Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations Applied Sciences ECC key agreement IoT authentication malicious user |
| title | Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations |
| title_full | Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations |
| title_fullStr | Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations |
| title_full_unstemmed | Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations |
| title_short | Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations |
| title_sort | deterministic systems for cryptographic primitives used in security models in particular iot configurations |
| topic | ECC key agreement IoT authentication malicious user |
| url | https://www.mdpi.com/2076-3417/15/6/3048 |
| work_keys_str_mv | AT danasimian deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations AT oanaadrianaticleanu deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations AT nicolaeconstantinescu deterministicsystemsforcryptographicprimitivesusedinsecuritymodelsinparticulariotconfigurations |