Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Costa, P., Noetzold, D., García Ovejero, R., Martín Esteban, R. & Leithardt, V. (2025). Prisec II: A comprehensive model for IoT security. In Daniel H. de la Iglesia, Juan F. de Paz Santana, Alfonso J. López Rivero (Ed.), Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025). (pp. 147-158). Salamanca: Springer.
Exportar Referência (IEEE)
P. D. Costa et al.,  "Prisec II: A comprehensive model for IoT security", in Proc. of the 5th Int. Conf. on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025), Daniel H. de la Iglesia, Juan F. de Paz Santana, Alfonso J. López Rivero, Ed., Salamanca, Springer, 2025, pp. 147-158
Exportar BibTeX
@inproceedings{costa2025_1778992451140,
	author = "Costa, P. and Noetzold, D. and García Ovejero, R. and Martín Esteban, R. and Leithardt, V.",
	title = "Prisec II: A comprehensive model for IoT security",
	booktitle = "Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025)",
	year = "2025",
	editor = "Daniel H. de la Iglesia, Juan F. de Paz Santana, Alfonso J. López Rivero",
	volume = "",
	number = "",
	series = "",
	doi = "10.1007/978-3-031-99474-6_13",
	pages = "147-158",
	publisher = "Springer",
	address = "Salamanca",
	organization = "",
	url = "https://link.springer.com/chapter/10.1007/978-3-031-99474-6_13"
}
Exportar RIS
TY  - CPAPER
TI  - Prisec II: A comprehensive model for IoT security
T2  - Proceedings of the 5th Int. Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DiTTEt 2025)
AU  - Costa, P.
AU  - Noetzold, D.
AU  - García Ovejero, R.
AU  - Martín Esteban, R.
AU  - Leithardt, V.
PY  - 2025
SP  - 147-158
SN  - 2194-5357
DO  - 10.1007/978-3-031-99474-6_13
CY  - Salamanca
UR  - https://link.springer.com/chapter/10.1007/978-3-031-99474-6_13
AB  - This study examines data security and efficiency in interconnected IoT devices, focusing on selecting cryptographic algorithms to improve secure data transmission in 5G networks. The proposed model introduces four security levels, each applying different encryption strategies to balance security and performance. Cloud computing is integrated to mitigate computational limitations in IoT devices, optimizing encryption and decryption processes. The study evaluates multiple cryptographic algorithms, analyzing encryption and decryption times, packet throughput, and memory usage. Experimental results demonstrate that the model enables efficient encryption while maintaining security, with AES-256 and XChaCha20 showing stable performance across different packet sizes. The cloud-based implementation improves resource distribution and reduces processing delays. This work contributes a structured cryptographic model adaptable to varying security needs and a performance evaluation of different cryptographic approaches in cloud-integrated environments.
ER  -