Advanced Encryption Standard (AES) pada Modul Internet of Things (IoT)
Sari
Kata Kunci
Teks Lengkap:
PDFDilihat:
Referensi
Wei, Z., et al., “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved,” IEEE Paper Manuscript, 2018, pp. 1-11.
Vashi, S. et al, “Internet of Things (IoT) - A Vision, Architectural Elements, and Security Issues,” IEEE, 2017.
Ukil, A., Sen, J., Koilakonda, S, “Embedded Security for Internet of Things,”. IoT Security Laboratory, Kolkata. 2014.
Carroll, E. et al., “McAfee Labs 2019 Threats Predictions Report,” [Online] Available: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-2019-threats-predictions/ [Diakses 10 Agustus 2019].
Razzaq, M. A., Qureshi, M. A., Gill, S. H. & Ullah, S., “Security Issues in the Internet of Things (IoT): A Comprehensive Study” (IJACSA) International Journal of Advanced Computer Science and Applications, 8(6), pp. 383-388, 2017.
Leveugle, R., Mkhinini, A. & Maistri, P., 2018. Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption. MDPI Journal Information, 9(114), pp. 1-15.
Noura, B., et al., “A compact 32-Bit AES design for embedded system”, IEEE, 2012.
Tsai, K., et al, “AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments,” Special Section on Security and Trusted Computing for Indutrial Internet of Things, pp. 45325-45333.
Raju, B., et al., “Implementation of an Efficient Dynamic AES”, IEEE, 2017, pp. 39-43.
Daemen, J. dan Rijmen, V. “The Design of Rijndael AES - The Advanced Encryption Standard”, Springer, Berlin, 2001.
Wardhani, R. W., Ogi, D., Syahral, M. & Catur, D. S., 2017. Fast Implementation of AES in Cortex-M3 for Security Information Devices, Bogor: IEEE.
Arrag, S., Hamdoun, A., Tragha, A. & Khamlich, S., “Design and Implementation A different Architectures of mixcolumn in FPGA”, International Journal of VLSI Design & Communication Systems, Vol. 3, 2012.
Kak, A., “Lecture 8: AES: The Advanced Encryption Standard - Lecture Notes on “Computer and Network Security,” [Online], Available: https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf [diakses 17 Mei 2019].
Blazhevski, D., “Modes of Operation of The AES Algorithm. Faculty of Computer Science and Engineering”, Skopje, Macedonia, pp. 212-216, 2013.
Dworkin, M., “Recommendation for Block Cipher Modes of Operation”, National Institute of Standards and Technology (NIST), 2001.
Echeverri, C., “Visualization of the Avalanche” Faculty for Business Informatics & Business Mathematics, University of Mannheim, Mannheim, 2017.
Moreno, C. & Fischmeister, S., 2017. Accurate Measurement of Small Execution Times – Getting Around Measurement Errors, Waterloo: University of Waterloo.
Elminaam, D. S. A., Kader, H. M. A. & Hadhoud, M. M., 2010. “Evaluating The Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, 10(3), pp. 213-219.
DOI: https://doi.org/10.15575/telka.v5n2.103-113
Refbacks
- Saat ini tidak ada refbacks.
Jurnal TELKA terindex oleh :
Didukung oleh :
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi-NonKomersial-BerbagiSerupa 4.0 Internasional.