Abstrakt: |
In the past years, the internet of things (IoT) used in different applications and very wide range of fields (e.g. cloud services, smart environments, logistics, social and personal domains, and health-care services). The IoT included a variety of components and devices such as radio frequency identification devices, wireless sensors, actuators, and wireless networks. Furthermore, the IoT with smart devices adopted in various companies, organizations, and public services systems. For instance, some devices such as Notebooks and smartphones have been used to perform different management activities and duties. These smart devices relied on data exchange and data storage resources in clouds computing services. In this context, the saved data and exchanged data required protection against hacking operations, transferred with more secure communications channels, and safe storage environment in the clouds and local storage systems. In this paper, we proposed some encryption algorithms to tackle the issue of data confidentiality in the IoT applications. This research provided analysis and investigation of these encryption algorithms in light of components of the designs, versions of these algorithms, encryption keys, block size, round functions, and the techniques used in the designs. [ABSTRACT FROM AUTHOR] |