ASSESSMENT THE INTEGRATED EFFICIENCY OF SOME CODING ALGORITHMS APPLICATIONS IN IOT ON FPGAS SPARTAN3E
DOI:
https://doi.org/10.51453/2354-1431/2023/978Keywords:
TAN TAO UNIVERSITY, EFFICIENCY ASSESSMENT, IOT, SPARTAN 3E FPGA ChipsAbstract
IoT (Internet of Things) is a peak development trend of today's technology. It is increasingly widespread and interested by many scientists because of its novelty, applicability, and convenience in a technological world where the user goal is everything [1]. With the ability to apply beyond space, time, penetrate to touch every corner, every area of life as it is today, it is also the center of all attackers and attackers to access or steal. data, hijacking attacks... are issues that still have a lot of openings for researchers and the field of data security for IoT systems is not out of this vortex [6,7].
Downloads
References
[1] A. de Saint-Exupery, “Internet of things, strategic research roadmap,” European Commision, 2013.
[2] A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A systemic approach for iot security,” in Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on. IEEE, 2013, pp. 351–355.
[3] C. Chitu and M. Glesner, “An FPGA Implementation of the AES-Rijndaelin OCB/ECB modes of operation”, Microelectronics Journal, vol. 36, pp. 139-146, 2005.
[4] T. B. Do and T. M. Duong, “Assessment of the integrated efficiency of block cipher algorithms for wireless networks on a FPGA chip” TNU Journal of Science and Technology, 226(11): 357 – 364, 2021
[5] H. M. Nguyen and T. B. Do, “Hybrid Model in the Block Cipher Applications for High-Speed
[6] Communications Networks,” International Journal of Computer Networks & Communications (IJCNC), vol. 12, no. 4, July 2020, doi: 10.5121/ijcnc.2020.12404 55.
[7] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT, A Lightweight Encryption Algorithm for Secure Internet of Things,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, pp. 402-411, 2017.
[8] Mirza Abdur Razzaq, Sajid Habib Gill, Muhammad Ali Qureshi, Saleem Ullah. (2017). Security Issues in the Internet of Things (IoT): A Comprehensive Study. International Journal of Advanced Computer Science and Applications, 8(6). DOI: http://dx.doi.org/10.14569/IJACSA.2017.080650.
[9] Nguyễn Quốc Tuấn, (2013), Ngôn ngữ VHDL để thiết kế vi mạch, NXB Đại học quốc gia thành phố Hồ Chí Minh.
[10] T. T. Nguyen and N. V. Pham, “Design pulse generator, frequency divider based on FPGA and VHDL” TNU Journal of Science and Technology, 226(11): 252 - 259, 2021
[11] R. Vignesh, A.Samydurai. (2017). Security on Internet of things (IoT) with Challenges and Countermeasures. International journal of Engineering development and research, 5(1), 417-423.
[12] Xilinx Inc, “Development System Reference Guide”, [E-book], 2021. [Online]. Available: www.xilinx.com [Accessed June 04, 2021].
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All articles published in SJTTU are licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA) license. This means anyone is free to copy, transform, or redistribute articles for any lawful purpose in any medium, provided they give appropriate attribution to the original author(s) and SJTTU, link to the license, indicate if changes were made, and redistribute any derivative work under the same license.
Copyright on articles is retained by the respective author(s), without restrictions. A non-exclusive license is granted to SJTTU to publish the article and identify itself as its original publisher, along with the commercial right to include the article in a hardcopy issue for sale to libraries and individuals.
Although the conditions of the CC BY-SA license don't apply to authors (as the copyright holder of your article, you have no restrictions on your rights), by submitting to SJTTU, authors recognize the rights of readers, and must grant any third party the right to use their article to the extent provided by the license.