My company plans to integrate IoT-based devices into an enterprise system. What are the best IoT encryption tools...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to secure data passing through these devices?
Internet of things (IoT) devices are resource-constrained. Proprietary protocols are embedded in the firmware. Memory sizes are small. Bandwidths are limited. Execution time is brief. Power is short lived. Batteries often (and inconveniently) need to be recharged. In some cases, there is no internal power, as in passive radio frequency ID (RFID) tags that draw power from nearby readers fitted with batteries. These constraints place limits on how the devices can be encrypted.
Your best options are lightweight encryption tools that can handle resource constraints. It is not possible to implement full encryption tools on IoT devices because these tools require larger memory size, larger program code size, uninterrupted power and longer execution time on laptops, client workstations and servers.
Which lightweight encryption tools your company should use depends on the specific type of IoT device. A tool well suited for one device type may not work properly for another device type.
Device-specific lightweight cryptography standards take a different approach than the NIST's general purpose cryptography standards that work on any laptops and desktops.
Several lightweight cryptography standards are described in ISO/IEC 29192. These include block ciphers, like PRESENT and CLEFIA, which are the lightweight versions of the Advanced Encryption Standard. There are also hardware-oriented stream ciphers, like Enocoro, that focus on chip size and energy consumption; hash functions, such as PHOTON, which concentrate on data integrity; and message authentication codes for validating and authenticating communications between devices.
Another example of a lightweight cryptography mechanism for IoT data is an elliptic curve-based authentication scheme, which has been implemented on RFID readers to authenticate passive RFID tags.
When evaluating lightweight encryption tools, your company should consider the tradeoffs between security and resource utilization. This includes the maximum number of cycles an encryption tool can undergo during an execution versus how low latency can be achieved.
Learn about how symmetric and asymmetric encryption algorithms differ
Find out if destroying encryption keys is a security best practice
Read more on the best email encryption products for enterprises
Dig Deeper on Disk and file encryption tools
Related Q&A from Judith Myerson
Anti-network reconnaissance tools can prevent attackers from getting access to system information. Expert Judith Myerson goes over the best ...continue reading
WebRTC protocols are being targeted by a new version of the DNSChanger exploit kit. Judith Myerson explains how these attacks work and what ...continue reading
There are many free VPN clients on the market, but are they secure enough for enterprise users? Expert Judith Myerson looks at the pros and cons of ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.