Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/36782
Registo completo
Campo DCValorIdioma
dc.contributor.authorCosta, P.-
dc.contributor.authorNoetzold, D.-
dc.contributor.authorGarcía Ovejero, R.-
dc.contributor.authorMartín Esteban, R.-
dc.contributor.authorLeithardt, V.-
dc.contributor.editorIglesia, Daniel H. de la-
dc.contributor.editorPaz Santana, Juan F. de-
dc.contributor.editorLópez Rivero, Alfonso J.-
dc.date.accessioned2026-04-01T08:20:44Z-
dc.date.issued2025-
dc.identifier.citationCosta, P., Noetzold, D., García Ovejero, R., Martín Esteban, R., & Leithardt, V. (2025). Prisec II: A comprehensive model for IoT security. In D. H. Iglesia, J. F. Paz Santana, & A. J. López Rivero (Eds.), Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025) (pp. 147-158). Springer. https://doi.org/10.1007/978-3-031-99474-6_13-
dc.identifier.isbn978-3-031-99474-6-
dc.identifier.issn2194-5357-
dc.identifier.urihttp://hdl.handle.net/10071/36782-
dc.description.abstractThis study examines data security and efficiency in interconnected IoT devices, focusing on selecting cryptographic algorithms to improve secure data transmission in 5G networks. The proposed model introduces four security levels, each applying different encryption strategies to balance security and performance. Cloud computing is integrated to mitigate computational limitations in IoT devices, optimizing encryption and decryption processes. The study evaluates multiple cryptographic algorithms, analyzing encryption and decryption times, packet throughput, and memory usage. Experimental results demonstrate that the model enables efficient encryption while maintaining security, with AES-256 and XChaCha20 showing stable performance across different packet sizes. The cloud-based implementation improves resource distribution and reduces processing delays. This work contributes a structured cryptographic model adaptable to varying security needs and a performance evaluation of different cryptographic approaches in cloud-integrated environments.eng
dc.language.isoeng-
dc.publisherSpringer-
dc.relationinfo:eu-repo/grantAgreement/FCT/Concurso de avaliação no âmbito do Programa Plurianual de Financiamento de Unidades de I&D (2017%2F2018) - Financiamento Base/UIDB%2F04466%2F2020/PT-
dc.relationinfo:eu-repo/grantAgreement/FCT/Concurso de avaliação no âmbito do Programa Plurianual de Financiamento de Unidades de I&D (2017%2F2018) - Financiamento Programático/UIDP%2F04466%2F2020/PT-
dc.relation.ispartofProceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025)-
dc.rightsembargoedAccess-
dc.subjectAlgorithmseng
dc.subjectCryptographic cloud Computingeng
dc.subjectOptimization data transmissioneng
dc.subjectEfficiencyeng
dc.subjectPriseceng
dc.titlePrisec II: A comprehensive model for IoT securityeng
dc.typeconferenceObject-
dc.event.typeConferênciapt
dc.event.locationSalamancaeng
dc.event.date2025-
dc.pagination147 - 158-
dc.peerreviewedyes-
dc.date.updated2026-04-01T09:19:00Z-
dc.description.versioninfo:eu-repo/semantics/acceptedVersion-
dc.identifier.doi10.1007/978-3-031-99474-6_13-
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Ciências da Computação e da Informaçãopor
dc.subject.fosDomínio/Área Científica::Engenharia e Tecnologia::Outras Engenharias e Tecnologiaspor
dc.subject.fosDomínio/Área Científica::Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapor
dc.date.embargo2026-08-07-
iscte.subject.odsEducação de qualidadepor
iscte.subject.odsIndústria, inovação e infraestruturaspor
iscte.subject.odsCidades e comunidades sustentáveispor
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-112623-
iscte.alternateIdentifiers.wosWOS:001598871600013-
Aparece nas coleções:ISTAR-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceObject_112623.pdf
  Restricted Access
660,95 kBAdobe PDFVer/Abrir Request a copy


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.