Uma Análise Experimental de Técnicas de Hashing em Dispositivos IoT para Soluções de Segurança
Keywords:
Iot, Hashing, SegurançaAbstract
The evolution of micro-controllers has enabled the diffusion of the Internet of Things (IoT) devices in any kind of environment. However, those devices still lack security solutions, once it has lower computational resources, hampering the applying of techniques, for example, Hashing algorithms. In this context, this paper aims to identify the viability of Hashing techniques in IoT devices to increase the reliability and evolve the security level, such as the do not burden the limited resources which are already limited. This identification was realized through real experimentation with two IoT devices (ESP8266, and ESP32) and an analysis of collected data. These experiments were realized the hashing algorithm in security solutions: SHA2-256, SHA2-512, SHA3-256, SHA3-512 e Blake2B-512. Through the experiments realized it was possible to identify the applicability limit of these hashing techniques to support security solutions when IoT devices are considered.
Downloads
References
Chien, H.-Y. (2021). Highly efficient anonymous iot authentication using composite
hashing. In 2021 IEEE Conference on Dependable and Secure Computing (DSC),
pages 1–7. IEEE.
da Rocha, C. P. (2019). Seguranc¸a da informac¸ ˜ao: A iso 27.001 como ferramenta de
controle para lgpd. Revista de Tecnologia da Informac¸ ˜ao e Comunicac¸ ˜ao da Faculdade
Est´acio do Par´a, 2(3).
Datasheet, E. (2015). Esp8266ex datasheet. Espr. Syst. Datasheet, pages 1–31.
Datasheet, E. (2021). Esp32s datasheet. Espr. Syst. Datasheet, pages 1–60.
de Oliveira, N. S. (2019). Seguranc¸a da informac¸ ˜ao para internet das coisas (iot): uma
abordagem sobre a lei geral de protec¸ ˜ao de dados (lgpd).
Garrido-Hidalgo, C., Olivares, T., Ramirez, F. J., and Roda-Sanchez, L. (2019). An endto-
end internet of things solution for reverse supply chain management in industry 4.0.
Computers in Industry, 112:103127.
Islambouli, R., Sweidan, Z., Mourad, A., and Abou-Rjeily, C. (2020). Towards trustaware
iot hashing offloading in mobile edge computing. In 2020 International Wireless
Communications and Mobile Computing (IWCMC), pages 2216–2221. IEEE.
Landge, I. A. and Satopay, H. (2018). Secured iot through hashing using md5. In 2018
fourth international conference on advances in electrical, electronics, information,
communication and bio-informatics (AEEICB), pages 1–5. IEEE.
Li, C. and Palanisamy, B. (2018). Privacy in internet of things: From principles to technologies.
IEEE Internet of Things Journal, PP:1–1.
Li, Z., Liu, Y., Liu, A., Wang, S., and Liu, H. (2018). Minimizing convergecast time
and energy consumption in green internet of things. IEEE Transactions on Emerging
Topics in Computing.
Parmar, M. et al. (2021). Hashing based data transaction and optimized storage for iot applications.
Turkish Journal of Computer and Mathematics Education (TURCOMAT),
(5):1206–1215.
Rao, V. and Prema, K. (2019a). Comparative study of lightweight hashing functions for
resource constrained devices of iot. In 2019 4th International Conference on Computational
Systems and Information Technology for Sustainable Solution (CSITSS),
volume 4, pages 1–5. IEEE.
Rao, V. and Prema, K. (2019b). Light-weight hashing method for user authentication in
internet-of-things. Ad Hoc Networks, 89:97–106.
Rizou, S., Alexandropoulou-Egyptiadou, E., and Psannis, K. (2020). Gdpr interference
with next generation 5g and iot networks. IEEE Access, PP:1–1.
Samih, H. (2019). Smart cities and internet of things. Journal of Information Technology
Case and Application Research, 21(1):3–12.
Stojkoska, B. L. R. and Trivodaliev, K. V. (2017). A review of internet of things for smart
home: Challenges and solutions. Journal of Cleaner Production, 140:1454–1464.
Zemrane, H., Baddi, Y., and Hasbi, A. (2020). Internet of things smart home ecosystem.
In Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation
System Networks, pages 101–125. Springer.