Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of ambient intelligence and humanized computing Ročník 15; číslo 2; s. 1625 - 1642
Hlavní autoři: Singh, Saurabh, Sharma, Pradip Kumar, Moon, Seo Yeon, Park, Jong Hyuk
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
Springer Nature B.V
Témata:
ISSN:1868-5137, 1868-5145
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the heterogeneous environments for IoT, there are many challenges and issues like power consumption of devices, limited battery, memory space, performance cost, and security in the Information Communication Technology (ICT) network. In this paper, we discuss a state-of-art of lightweight cryptographic primitives which include lightweight block ciphers, hash function, stream ciphers, high performance system, and low resources device for IoT environment in details. We analyze many lightweight cryptographic algorithms based on their key size, block size, number of rounds, and structures. In addition, we discuss the security architecture in IoT for constrained device environment, and focus on research challenges, issues and solutions. Finally, a proposed security scheme with a service scenario for an improvement of resource constrained IoT environment and open issues are discussed.
AbstractList There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the heterogeneous environments for IoT, there are many challenges and issues like power consumption of devices, limited battery, memory space, performance cost, and security in the Information Communication Technology (ICT) network. In this paper, we discuss a state-of-art of lightweight cryptographic primitives which include lightweight block ciphers, hash function, stream ciphers, high performance system, and low resources device for IoT environment in details. We analyze many lightweight cryptographic algorithms based on their key size, block size, number of rounds, and structures. In addition, we discuss the security architecture in IoT for constrained device environment, and focus on research challenges, issues and solutions. Finally, a proposed security scheme with a service scenario for an improvement of resource constrained IoT environment and open issues are discussed.
Author Singh, Saurabh
Sharma, Pradip Kumar
Park, Jong Hyuk
Moon, Seo Yeon
Author_xml – sequence: 1
  givenname: Saurabh
  surname: Singh
  fullname: Singh, Saurabh
  organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
– sequence: 2
  givenname: Pradip Kumar
  surname: Sharma
  fullname: Sharma, Pradip Kumar
  organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
– sequence: 3
  givenname: Seo Yeon
  surname: Moon
  fullname: Moon, Seo Yeon
  organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
– sequence: 4
  givenname: Jong Hyuk
  surname: Park
  fullname: Park, Jong Hyuk
  email: jhpark1@seoultech.ac.kr
  organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech)
BookMark eNp9kE1LAzEURYNUsNb-AHcBt47ma5qJu1L8goKbuhNCmrxpp0yTmkwr_ffOMKIg6FvkZXFPcjnnaOCDB4QuKbmhhMjbRNkkZxmhMiNCiUycoCEtJkWWU5EPvu9cnqFxShvSDlecUjpEb1N3MN6Cw3W1Wjcf0J0YvI3HXVMFj029CrFq1tuEyxDxc1hgB4fKQrrDaR8PcLzGdm3qGvwKEjbe4RTqfcemC3RamjrB-GuP0OvD_WL2lM1fHp9n03lmGaciW4JQkufW8iW4AhQFw01pXK4kc0pRtSxsSV1eCs6cFaRwOSfWcAGiIKK0fISu-nd3MbzvITV6E_bRt19qpjhnkk8kbVOyT9kYUopQals1pivaRFPVmhLd2dS9Td3a1J1NLVqS_iJ3sdqaePyXYT2T2myrJv50-hv6BM9digM
CitedBy_id crossref_primary_10_1109_JIOT_2019_2900631
crossref_primary_10_1109_COMST_2020_2997475
crossref_primary_10_1109_ACCESS_2023_3257171
crossref_primary_10_3390_info14120635
crossref_primary_10_2139_ssrn_5363395
crossref_primary_10_1007_s11227_025_07448_8
crossref_primary_10_1109_JIOT_2023_3344677
crossref_primary_10_26634_jes_11_1_18924
crossref_primary_10_1007_s11277_020_07346_7
crossref_primary_10_1109_ACCESS_2021_3052867
crossref_primary_10_1007_s43926_025_00150_4
crossref_primary_10_1007_s11042_021_10896_y
crossref_primary_10_1109_JIOT_2018_2846040
crossref_primary_10_3390_cryptography7030041
crossref_primary_10_1109_JAS_2022_106058
crossref_primary_10_1109_ACCESS_2025_3559617
crossref_primary_10_1007_s11042_024_18765_0
crossref_primary_10_1007_s11235_021_00844_4
crossref_primary_10_1007_s12652_018_0850_z
crossref_primary_10_3390_electronics13234767
crossref_primary_10_3390_math13050734
crossref_primary_10_1007_s10586_025_05208_0
crossref_primary_10_1145_3586007
crossref_primary_10_3390_su17062386
crossref_primary_10_1109_TIM_2023_3300444
crossref_primary_10_1007_s12652_020_02303_5
crossref_primary_10_3390_iot6020023
crossref_primary_10_1109_TII_2024_3488795
crossref_primary_10_3390_s21010038
crossref_primary_10_1007_s12083_023_01587_6
crossref_primary_10_1088_1402_4896_adc6c8
crossref_primary_10_3390_s24216843
crossref_primary_10_1002_ett_4866
crossref_primary_10_1007_s12652_020_02603_w
crossref_primary_10_1007_s12652_020_02782_6
crossref_primary_10_1109_ACCESS_2018_2848586
crossref_primary_10_3390_electronics14030405
crossref_primary_10_1007_s12652_020_02076_x
crossref_primary_10_1109_TNSM_2020_2983921
crossref_primary_10_3390_electronics11111762
crossref_primary_10_1155_2021_6632747
crossref_primary_10_3390_electronics11233920
crossref_primary_10_1007_s11042_020_09625_8
crossref_primary_10_1109_TIFS_2025_3551638
crossref_primary_10_1109_TCSII_2022_3185608
crossref_primary_10_1088_1742_6596_1828_1_012101
crossref_primary_10_3390_s23115102
crossref_primary_10_1007_s40747_021_00280_6
crossref_primary_10_1007_s41870_024_02175_4
crossref_primary_10_1007_s10796_023_10383_9
crossref_primary_10_1007_s11277_020_07134_3
crossref_primary_10_4018_IJEHMC_2019100102
crossref_primary_10_1155_2021_2067137
crossref_primary_10_1109_JIOT_2020_3026493
crossref_primary_10_22399_ijcesen_954
crossref_primary_10_1007_s11276_021_02850_5
crossref_primary_10_1007_s42979_021_00941_w
crossref_primary_10_1109_ACCESS_2024_3464102
crossref_primary_10_1007_s11042_024_18620_2
crossref_primary_10_51583_IJLTEMAS_2025_140300054
crossref_primary_10_1109_ACCESS_2020_3029847
crossref_primary_10_1007_s42452_021_04156_9
crossref_primary_10_1016_j_jisa_2021_102945
crossref_primary_10_1109_ACCESS_2021_3093442
crossref_primary_10_1109_TII_2021_3067026
crossref_primary_10_1109_JIOT_2023_3341875
crossref_primary_10_1109_OJCOMS_2025_3593311
crossref_primary_10_1109_TC_2020_2972528
crossref_primary_10_1109_JIOT_2022_3167832
crossref_primary_10_1109_ACCESS_2019_2901753
crossref_primary_10_1109_TSC_2025_3586152
crossref_primary_10_1155_2022_6945004
crossref_primary_10_1016_j_matpr_2021_03_151
crossref_primary_10_3390_sym17060881
crossref_primary_10_1109_TIFS_2020_3045318
crossref_primary_10_3390_e26030216
crossref_primary_10_3390_info9010013
crossref_primary_10_1109_ACCESS_2022_3220622
crossref_primary_10_1109_TIFS_2022_3158553
crossref_primary_10_1109_ACCESS_2022_3209148
crossref_primary_10_3390_s25195936
crossref_primary_10_3390_math10060886
crossref_primary_10_1109_ACCESS_2020_3037359
crossref_primary_10_3390_s25165103
crossref_primary_10_1007_s11277_022_09748_1
crossref_primary_10_1007_s12652_020_02403_2
crossref_primary_10_3390_fi17010030
crossref_primary_10_1109_JIOT_2025_3571794
crossref_primary_10_1007_s11042_021_10750_1
crossref_primary_10_1007_s10207_022_00609_3
crossref_primary_10_1007_s12652_020_01694_9
crossref_primary_10_1109_ACCESS_2022_3207472
crossref_primary_10_1007_s40860_020_00116_z
crossref_primary_10_1007_s11276_024_03714_4
crossref_primary_10_1109_ACCESS_2019_2912929
crossref_primary_10_1007_s10836_022_05997_x
crossref_primary_10_1007_s12652_021_03395_3
crossref_primary_10_1109_COMST_2022_3218527
crossref_primary_10_1007_s11042_018_5660_y
crossref_primary_10_3390_s20216131
crossref_primary_10_3390_s24227314
crossref_primary_10_1109_JIOT_2020_3044526
crossref_primary_10_3390_app15020499
crossref_primary_10_1109_JLT_2022_3200307
crossref_primary_10_3390_drones9080583
crossref_primary_10_1007_s11042_022_11996_z
crossref_primary_10_1109_TCSS_2021_3082022
crossref_primary_10_1109_JIOT_2018_2796561
crossref_primary_10_1007_s12652_018_1118_3
crossref_primary_10_2478_ias_2025_0002
crossref_primary_10_3390_electronics10212647
crossref_primary_10_3390_app122010192
crossref_primary_10_1145_3703448
crossref_primary_10_1109_ACCESS_2019_2902621
crossref_primary_10_1109_JIOT_2022_3206667
crossref_primary_10_1007_s12652_020_02658_9
crossref_primary_10_1007_s12652_020_02424_x
crossref_primary_10_1109_ACCESS_2022_3227449
crossref_primary_10_32604_cmc_2024_057877
crossref_primary_10_1016_j_future_2022_10_011
crossref_primary_10_1080_23742917_2019_1601889
crossref_primary_10_1109_ACCESS_2024_3482991
crossref_primary_10_1007_s11042_021_10564_1
crossref_primary_10_1109_TNSE_2022_3223281
crossref_primary_10_1007_s11276_022_03197_1
crossref_primary_10_3390_app15158704
crossref_primary_10_1007_s12652_018_0998_6
crossref_primary_10_1007_s10462_025_11248_0
crossref_primary_10_1109_ACCESS_2024_3357082
crossref_primary_10_1007_s11042_018_5663_8
Cites_doi 10.1016/j.micpro.2016.03.011
10.1016/j.comnet.2015.08.002
10.1016/j.adhoc.2015.01.006
10.1016/j.procs.2016.02.027
10.1109/TIFS.2014.2365734
10.1016/j.jnca.2016.09.002
10.1016/j.comnet.2008.04.002
10.1145/2501654.2501655
10.1007/s00145-012-9125-6
10.1007/s12652-016-0359-2
10.1016/j.procs.2015.12.128
10.1007/s11276-010-0252-4
10.1016/j.jnca.2015.06.021
10.1109/JSEN.2014.2380816
10.1109/MM.2004.11
10.1155/2016/8085407
10.1109/ACCESS.2016.2549047
10.3329/rujse.v44i0.30398
10.4236/wsn.2014.61001
10.1016/j.micpro.2012.09.007
10.1166/asl.2016.7790
10.1016/j.future.2014.10.010
10.1155/2016/8763528
10.1016/j.jcss.2016.02.005
10.1016/j.ipl.2014.10.010
10.1109/MDT.2012.2196252
10.1007/s10916-015-0341-0
10.1002/sec.915
10.1016/j.jnca.2016.11.017
10.1016/j.future.2014.11.016
10.1109/MCOM.2017.1600363CM
10.1504/IJWMC.2007.013798
10.1007/978-3-642-37949-9_54
10.1007/s11227-016-1850-4
10.1016/j.jnca.2015.09.001
10.1186/s13673-015-0027-0
10.1016/j.protcy.2016.08.148
10.1007/978-3-540-74619-5_13
10.1007/978-3-540-25937-4_18
10.1007/3-540-60590-8_7
10.1109/ISAMSR.2016.7810021
10.1145/2744769.2747946
10.1016/j.future.2016.09.021
10.1109/BigDataSecurity-HPSC-IDS.2016.29
10.17487/rfc7252
10.1007/978-3-642-22792-9_13
10.1007/978-3-540-74735-2_31
10.1007/978-3-642-15031-9_27
10.1007/978-3-642-24209-0_10
10.1109/SOSE.2015.47
10.1007/978-3-540-68351-3_15
10.1109/ARES.2016.40
10.1109/CCECE.2011.6030408
10.6028/NIST.IR.8114
10.1109/IAdCC.2014.6779339
10.5121/csit.2014.4519
10.1007/978-3-642-33027-8_23
10.1109/CLOUD.2016.0131
10.1007/11894063_22
10.1007/978-3-642-23951-9_21
10.1109/MDT.2007.187
10.1007/11915034_61
10.1109/ICIICT.2015.7396103
10.1109/ICECCE.2014.7086640
10.1007/978-3-540-85893-5_7
10.1007/3-540-60590-8_29
10.1109/IACS.2015.7103204
10.1109/CIT/IUCC/DASC/PICOM.2015.88
10.1007/978-3-540-85053-3_18
ContentType Journal Article
Copyright Springer-Verlag Berlin Heidelberg 2017
Springer-Verlag Berlin Heidelberg 2017.
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2017
– notice: Springer-Verlag Berlin Heidelberg 2017.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.1007/s12652-017-0494-4
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
AAdvanced Technologies & Aerospace Database (subscription)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Advanced Technologies & Aerospace Collection

Database_xml – sequence: 1
  dbid: P5Z
  name: AAdvanced Technologies & Aerospace Database (subscription)
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1868-5145
EndPage 1642
ExternalDocumentID 10_1007_s12652_017_0494_4
GrantInformation_xml – fundername: IITP, Korea government (MISP)
  grantid: No.B0190-16-2030
GroupedDBID -EM
06D
0R~
0VY
1N0
203
29~
2JY
2VQ
30V
4.4
406
408
409
40D
96X
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
AAZMS
ABAKF
ABBXA
ABDZT
ABECU
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACKNC
ACMLO
ACOKC
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETCA
AEVLU
AEXYK
AFBBN
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKLTO
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
ARAPS
AUKKA
AXYYD
AYJHY
BENPR
BGLVJ
BGNMA
BSONS
CCPQU
CSCUP
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FYJPI
GGCAI
GGRSB
GJIRD
GQ6
GQ7
GQ8
H13
HCIFZ
HF~
HG6
HMJXF
HQYDN
HRMNR
HZ~
I0C
IKXTQ
IWAJR
IXD
IZIGR
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KOV
LLZTM
M4Y
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P2P
P9P
PT4
QOS
R89
R9I
RLLFE
ROL
RSV
S1Z
S27
S3B
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
TSG
U2A
UG4
UOJIU
UTJUX
UZXMN
VFIZW
W48
WK8
Z45
Z5O
Z7R
Z7X
Z83
Z88
ZMTXR
~A9
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c2314-be49735cc3bed8e91ea3afad5972d9919b8cf1d5f432dc408d530ca34e4804fc3
IEDL.DBID RSV
ISSN 1868-5137
IngestDate Wed Nov 05 02:57:57 EST 2025
Tue Nov 18 22:35:35 EST 2025
Sat Nov 29 03:41:17 EST 2025
Fri Feb 21 02:41:51 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Lightweight cryptography
Constrained devices
Internet-of-things
Symmetric algorithms
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2314-be49735cc3bed8e91ea3afad5972d9919b8cf1d5f432dc408d530ca34e4804fc3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2933273671
PQPubID 2043913
PageCount 18
ParticipantIDs proquest_journals_2933273671
crossref_citationtrail_10_1007_s12652_017_0494_4
crossref_primary_10_1007_s12652_017_0494_4
springer_journals_10_1007_s12652_017_0494_4
PublicationCentury 2000
PublicationDate 20240200
2024-02-00
20240201
PublicationDateYYYYMMDD 2024-02-01
PublicationDate_xml – month: 2
  year: 2024
  text: 20240200
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle Journal of ambient intelligence and humanized computing
PublicationTitleAbbrev J Ambient Intell Human Comput
PublicationYear 2024
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Padmavathi, Kumari (CR60) 2013; 2
Liang, Au, Liu, Susilo, Wong, Yang, Yang (CR48) 2015; 52
Hodjat, Verbauwhede (CR32) 2004; 24
CR36
CR35
Kar, Mishra (CR38) 2016; 12
CR78
CR33
CR77
CR31
CR75
Mushtaque (CR56) 2014; 2
CR74
Ahamad, Abdullah (CR1) 2016; 44
CR73
Bansod, Raval, Pisharoty (CR7) 2015; 10
Latré, Braem, Moerman, Blondia, Demeester (CR44) 2011; 17
Singh, Sharma, Moon, Moon, Park (CR70) 2016
Maity, Park (CR50) 2016; 7
CR2
Hell, Johansson, Meier (CR30) 2007; 2
Sahraoui, Bilami (CR65) 2015; 91
Guo, Wang, Ji, Geng, Xiong (CR28) 2015; 39
CR4
CR6
Kim, Lee, Yi, Park (CR42) 2016; 2016
Nguyen, Laurent, Oualha (CR59) 2015; 32
CR5
CR8
Souissi, Ben-Ammar (CR72) 2014; 6
Hosseinzadeh, Hosseinzadeh (CR34) 2016; 5
CR49
Singh, Sharma, Park (CR71) 2016; 22
Karakoç, Demirci, Harmancı (CR39) 2015; 115
CR45
Yao, Chen, Tian (CR83) 2015; 49
CR86
CR41
CR85
CR40
Tripathi, Agrawal (CR76) 2014; 1
CR80
James, Kumar (CR37) 2016; 25
Fan, Mandal, Gong (CR23) 2013
Hayajneh, Doomun, Al-Mashaqbeh, Mohd (CR29) 2014; 7
Negash, Rahmani, Westerlund, Liljeberg, Tenhunen (CR58) 2016; 7
Aumasson, Henzen, Meier, Naya-Plasencia (CR3) 2013; 26
Sajid, Abbas, Saleem (CR66) 2016; 4
Zhou, Cao, Dong, Vasilakos (CR87) 2017; 55
CR19
CR18
Kitsos, Sklavos, Provelengios, Skodras (CR43) 2013; 37
Grand, Bossuet, Le Gal, Gogniat, Dallet (CR26) 2011
CR15
CR14
CR13
Peng, Du, Li, Li (CR61) 2016; 2016
CR55
CR10
CR53
Buja, Latip (CR17) 2015; 72
Li, Liu, Wang (CR47) 2016; 45
CR51
Eisenbarth, Kumar (CR21) 2007; 24
Verma, Jain, Shrivastava (CR79) 2015; 7
Mohd, Hayajneh, Vasilakos (CR54) 2015; 58
Bhunia, Abramovici, Agrawal, Bradley, Hsiao, MS, Plusquellic, Tehranipoor (CR11) 2013; 30
Singh, Jeong, Park (CR69) 2016; 75
Biswas, Muthukkumarasamy, Singh (CR12) 2015; 15
Yang, Zheng, Tang (CR82) 2016
Naruse, Mohri, Shiraishi (CR57) 2015; 5
CR27
Baskar, Balasubramaniyan, Manivannan (CR9) 2016; 78
CR25
CR24
CR68
CR67
CR22
CR20
CR64
CR63
Lee, Lim (CR46) 2014; 8
Xiao, Wang, Zhu, Wang (CR81) 2016; 59
Puthal, Nepal, Ranjan, Chen (CR62) 2017; 83
Masram, Shahare, Abraham, Moona (CR52) 2014; 6
Yick, Mukherjee, Ghosal (CR84) 2008; 52
Bossuet, Grand, Gaspar, Fischer, Gogniat (CR16) 2013; 45
494_CR80
494_CR41
494_CR85
C Xiao (494_CR81) 2016; 59
494_CR86
494_CR40
M Grand (494_CR26) 2011
494_CR36
JH Lee (494_CR46) 2014; 8
L Bossuet (494_CR16) 2013; 45
494_CR78
494_CR35
B Latré (494_CR44) 2011; 17
J Zhou (494_CR87) 2017; 55
MM Ahamad (494_CR1) 2016; 44
M James (494_CR37) 2016; 25
494_CR2
S Bhunia (494_CR11) 2013; 30
K Biswas (494_CR12) 2015; 15
X Fan (494_CR23) 2013
494_CR4
G Bansod (494_CR7) 2015; 10
494_CR6
R Masram (494_CR52) 2014; 6
494_CR5
494_CR8
494_CR10
T Hayajneh (494_CR29) 2014; 7
494_CR55
494_CR53
494_CR51
R Tripathi (494_CR76) 2014; 1
M Hell (494_CR30) 2007; 2
J Hosseinzadeh (494_CR34) 2016; 5
494_CR49
KT Nguyen (494_CR59) 2015; 32
J Yick (494_CR84) 2008; 52
494_CR45
T Naruse (494_CR57) 2015; 5
S Maity (494_CR50) 2016; 7
S Singh (494_CR69) 2016; 75
F Karakoç (494_CR39) 2015; 115
L Li (494_CR47) 2016; 45
T Eisenbarth (494_CR21) 2007; 24
494_CR22
K Liang (494_CR48) 2015; 52
494_CR63
X Yao (494_CR83) 2015; 49
494_CR20
494_CR64
MA Mushtaque (494_CR56) 2014; 2
P Guo (494_CR28) 2015; 39
C Peng (494_CR61) 2016; 2016
494_CR18
494_CR19
D Puthal (494_CR62) 2017; 83
494_CR14
C Baskar (494_CR9) 2016; 78
494_CR15
P Kitsos (494_CR43) 2013; 37
494_CR13
R Souissi (494_CR72) 2014; 6
AG Buja (494_CR17) 2015; 72
JM Kim (494_CR42) 2016; 2016
S Sahraoui (494_CR65) 2015; 91
B Padmavathi (494_CR60) 2013; 2
S Singh (494_CR70) 2016
A Hodjat (494_CR32) 2004; 24
494_CR33
A Sajid (494_CR66) 2016; 4
494_CR77
494_CR74
494_CR31
494_CR75
494_CR73
JP Aumasson (494_CR3) 2013; 26
494_CR27
494_CR25
Y Yang (494_CR82) 2016
494_CR67
S Singh (494_CR71) 2016; 22
494_CR24
494_CR68
D Verma (494_CR79) 2015; 7
BJ Mohd (494_CR54) 2015; 58
B Negash (494_CR58) 2016; 7
J Kar (494_CR38) 2016; 12
References_xml – ident: CR45
– ident: CR22
– volume: 45
  start-page: 45
  year: 2016
  end-page: 55
  ident: CR47
  article-title: QTL: a new ultra-lightweight block cipher
  publication-title: Microproc Microsys
  doi: 10.1016/j.micpro.2016.03.011
– ident: CR49
– ident: CR68
– ident: CR74
– ident: CR4
– volume: 91
  start-page: 26
  year: 2015
  end-page: 45
  ident: CR65
  article-title: Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
  publication-title: Comp Net
  doi: 10.1016/j.comnet.2015.08.002
– volume: 5
  start-page: 31
  issue: 4
  year: 2016
  end-page: 41
  ident: CR34
  article-title: A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation
  publication-title: Adv Comput Sci Int J
– volume: 8
  start-page: 59
  issue: 2
  year: 2014
  end-page: 66
  ident: CR46
  article-title: Parallel architecture for high-speed block cipher, HIGHT
  publication-title: Int J Sec Appl
– ident: CR51
– volume: 32
  start-page: 17
  year: 2015
  end-page: 31
  ident: CR59
  article-title: Survey on secure communication protocols for the internet of things
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.01.006
– start-page: 29
  year: 2011
  end-page: 40
  ident: CR26
  article-title: Design and implementation of a multi-core crypto-processor for software defined radios
  publication-title: Proceeding of International Symposium on Applied Reconfigurable Computing
– volume: 78
  start-page: 165
  year: 2016
  end-page: 171
  ident: CR9
  article-title: Establishment of light weight cryptography for resource constraint environment using FPGA
  publication-title: Proced Comput Sci
  doi: 10.1016/j.procs.2016.02.027
– ident: CR35
– ident: CR80
– volume: 7
  start-page: 1
  year: 2016
  end-page: 18
  ident: CR50
  article-title: Powering IoT devices: a novel design and analysis technique
  publication-title: J Converg
– volume: 2
  start-page: 170
  issue: 4
  year: 2013
  end-page: 174
  ident: CR60
  article-title: A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution
  publication-title: Int J Sci Res
– ident: CR77
– ident: CR8
– ident: CR25
– volume: 10
  start-page: 142
  issue: 1
  year: 2015
  end-page: 151
  ident: CR7
  article-title: Implementation of a new lightweight encryption design for embedded security
  publication-title: IEEE Trans Inf Forens Sec
  doi: 10.1109/TIFS.2014.2365734
– volume: 75
  start-page: 200
  year: 2016
  end-page: 222
  ident: CR69
  article-title: A survey on cloud computing security: issues, threats, and solutions
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2016.09.002
– volume: 52
  start-page: 2292
  issue: 12
  year: 2008
  end-page: 2330
  ident: CR84
  article-title: Wireless sensor network survey
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2008.04.002
– volume: 45
  start-page: 1
  issue: 4
  year: 2013
  end-page: 41
  ident: CR16
  article-title: Architectures of flexible symmetric key crypto engines—a survey: from hardware coprocessor to multi-crypto-processor system on chip
  publication-title: ACM Comput Sur
  doi: 10.1145/2501654.2501655
– volume: 26
  start-page: 313
  issue: 2
  year: 2013
  end-page: 339
  ident: CR3
  article-title: Quark: a lightweight hash
  publication-title: J Crypto
  doi: 10.1007/s00145-012-9125-6
– ident: CR19
– volume: 7
  start-page: 305
  issue: 3
  year: 2016
  end-page: 319
  ident: CR58
  article-title: LISA 2.0: lightweight internet of things service bus architecture using node centric networking
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-016-0359-2
– volume: 12
  start-page: 226
  issue: 2
  year: 2016
  end-page: 233
  ident: CR38
  article-title: Mitigating threats and security metrics in cloud computing
  publication-title: J Inf Process Sys
– ident: CR67
– ident: CR75
– ident: CR15
– volume: 72
  start-page: 469
  year: 2015
  end-page: 476
  ident: CR17
  article-title: The direction of lightweight ciphers in mobile big data computing
  publication-title: Proced Comput Sci
  doi: 10.1016/j.procs.2015.12.128
– volume: 17
  start-page: 1
  issue: 1
  year: 2011
  end-page: 18
  ident: CR44
  article-title: A survey on wireless body area networks
  publication-title: Wire Net
  doi: 10.1007/s11276-010-0252-4
– volume: 59
  start-page: 117
  year: 2016
  end-page: 125
  ident: CR81
  article-title: A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2015.06.021
– volume: 15
  start-page: 2801
  issue: 5
  year: 2015
  end-page: 2809
  ident: CR12
  article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks
  publication-title: IEEE Sens J
  doi: 10.1109/JSEN.2014.2380816
– volume: 24
  start-page: 34
  issue: 3
  year: 2004
  end-page: 45
  ident: CR32
  article-title: High-throughput programmable crypto co-processor
  publication-title: IEEE Micro
  doi: 10.1109/MM.2004.11
– ident: CR36
– volume: 2016
  start-page: 1
  year: 2016
  end-page: 10
  ident: CR42
  article-title: Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks
  publication-title: J Sens
  doi: 10.1155/2016/8085407
– ident: CR78
– ident: CR85
– ident: CR5
– ident: CR64
– volume: 4
  start-page: 1375
  year: 2016
  end-page: 1384
  ident: CR66
  article-title: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges
  publication-title: IEEE Acc
  doi: 10.1109/ACCESS.2016.2549047
– volume: 44
  start-page: 131
  year: 2016
  end-page: 139
  ident: CR1
  article-title: Comparison of encryption algorithms for multimedia
  publication-title: Rajshahi Univ J Sci Eng
  doi: 10.3329/rujse.v44i0.30398
– volume: 6
  start-page: 1
  issue: 1
  year: 2014
  end-page: 7
  ident: CR72
  article-title: An intelligent wireless sensor network temperature acquisition system with an FPGA
  publication-title: Wire Sens Netw
  doi: 10.4236/wsn.2014.61001
– volume: 24
  start-page: 1
  issue: 6
  year: 2007
  end-page: 12
  ident: CR21
  article-title: A survey of lightweight-cryptography implementations
  publication-title: IEEE Desi Test Comput
– volume: 37
  start-page: 235
  issue: 2
  year: 2013
  end-page: 245
  ident: CR43
  article-title: FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
  publication-title: Microprocess Microsyst
  doi: 10.1016/j.micpro.2012.09.007
– volume: 22
  start-page: 2461
  issue: 9
  year: 2016
  end-page: 2464
  ident: CR71
  article-title: Secure clouds forensic investigative architecture for social network cloud
  publication-title: Adv Sci Lett
  doi: 10.1166/asl.2016.7790
– volume: 49
  start-page: 104
  year: 2015
  end-page: 112
  ident: CR83
  article-title: A lightweight attribute-based encryption scheme for the Internet of Things
  publication-title: Fut Gen Comp Sys
  doi: 10.1016/j.future.2014.10.010
– volume: 2016
  start-page: 110
  year: 2016
  ident: CR61
  article-title: An ultra-lightweight encryption scheme in underwater acoustic networks
  publication-title: J Sens
  doi: 10.1155/2016/8763528
– ident: CR18
– volume: 2
  start-page: 76
  issue: 4
  year: 2014
  end-page: 82
  ident: CR56
  article-title: Comparative analysis on different parameters of encryption algorithms for information security
  publication-title: JCSE Int J Comput Sci
– volume: 83
  start-page: 22
  issue: 1
  year: 2017
  end-page: 42
  ident: CR62
  article-title: A dynamic prime number based efficient security mechanism for big sensing data streams
  publication-title: J Comp Syst Sci
  doi: 10.1016/j.jcss.2016.02.005
– ident: CR14
– volume: 115
  start-page: 359
  issue: 2
  year: 2015
  end-page: 367
  ident: CR39
  article-title: AKF: A key alternating Feistel scheme for lightweight cipher designs
  publication-title: Info Proc Lett
  doi: 10.1016/j.ipl.2014.10.010
– ident: CR2
– ident: CR53
– ident: CR10
– ident: CR33
– volume: 7
  start-page: 51
  issue: 3
  year: 2015
  end-page: 65
  ident: CR79
  article-title: Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks
  publication-title: IUP J Telecommun
– ident: CR6
– volume: 30
  start-page: 6
  issue: 3
  year: 2013
  end-page: 17
  ident: CR11
  article-title: Protection against hardware trojan attacks: towards a comprehensive solution
  publication-title: IEEE Des Test
  doi: 10.1109/MDT.2012.2196252
– ident: CR86
– volume: 39
  start-page: 190
  issue: 12
  year: 2015
  end-page: 198
  ident: CR28
  article-title: A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks
  publication-title: J Medi Sys
  doi: 10.1007/s10916-015-0341-0
– ident: CR40
– ident: CR63
– ident: CR27
– volume: 1
  start-page: 68
  issue: 6
  year: 2014
  end-page: 76
  ident: CR76
  article-title: Comparative study of symmetric and asymmetric cryptography techniques
  publication-title: Int J Adv Found Res Comp
– volume: 7
  start-page: 2015
  issue: 11
  year: 2014
  end-page: 2038
  ident: CR29
  article-title: An energy-efficient and security aware route selection protocol for wireless sensor networks
  publication-title: Sec Commun Net
  doi: 10.1002/sec.915
– year: 2016
  ident: CR82
  article-title: Lightweight distributed secure data management system for health internet of things
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2016.11.017
– ident: CR73
– volume: 52
  start-page: 95
  year: 2015
  end-page: 108
  ident: CR48
  article-title: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
  publication-title: Fut Gen Comput Sys
  doi: 10.1016/j.future.2014.11.016
– volume: 55
  start-page: 26
  issue: 1
  year: 2017
  end-page: 33
  ident: CR87
  article-title: Security and privacy for cloud-based IoT: challenges
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2017.1600363CM
– ident: CR31
– ident: CR13
– volume: 2
  start-page: 86
  issue: 1
  year: 2007
  end-page: 93
  ident: CR30
  article-title: Grain: a stream cipher for constrained environments
  publication-title: Int J Wirel Mob Comput
  doi: 10.1504/IJWMC.2007.013798
– ident: CR55
– volume: 6
  start-page: 43
  issue: 4
  year: 2014
  end-page: 52
  ident: CR52
  article-title: Analysis and comparison of symmetric key cryptographic algorithms based on various file features
  publication-title: Int J Netw Sec Appl
– start-page: 617
  year: 2013
  end-page: 632
  ident: CR23
  article-title: Wg-8: a lightweight stream cipher for resource-constrained smart devices
  publication-title: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
  doi: 10.1007/978-3-642-37949-9_54
– ident: CR41
– year: 2016
  ident: CR70
  article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
  publication-title: J Supercomp
  doi: 10.1007/s11227-016-1850-4
– ident: CR24
– volume: 58
  start-page: 73
  year: 2015
  end-page: 93
  ident: CR54
  article-title: A survey on lightweight block ciphers for low-resource devices: comparative study and open issues
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2015.09.001
– volume: 5
  start-page: 8
  issue: 1
  year: 2015
  end-page: 25
  ident: CR57
  article-title: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
  publication-title: Human-centric Comput Inf Sci
  doi: 10.1186/s13673-015-0027-0
– ident: CR20
– volume: 25
  start-page: 582
  year: 2016
  end-page: 589
  ident: CR37
  article-title: An implementation of modified lightweight advanced encryption standard in FPGA
  publication-title: Proc Technol
  doi: 10.1016/j.protcy.2016.08.148
– volume: 12
  start-page: 226
  issue: 2
  year: 2016
  ident: 494_CR38
  publication-title: J Inf Process Sys
– volume: 2
  start-page: 76
  issue: 4
  year: 2014
  ident: 494_CR56
  publication-title: JCSE Int J Comput Sci
– volume: 83
  start-page: 22
  issue: 1
  year: 2017
  ident: 494_CR62
  publication-title: J Comp Syst Sci
  doi: 10.1016/j.jcss.2016.02.005
– volume: 1
  start-page: 68
  issue: 6
  year: 2014
  ident: 494_CR76
  publication-title: Int J Adv Found Res Comp
– ident: 494_CR19
– volume: 10
  start-page: 142
  issue: 1
  year: 2015
  ident: 494_CR7
  publication-title: IEEE Trans Inf Forens Sec
  doi: 10.1109/TIFS.2014.2365734
– ident: 494_CR45
  doi: 10.1007/978-3-540-74619-5_13
– ident: 494_CR73
– ident: 494_CR74
  doi: 10.1007/978-3-540-25937-4_18
– volume: 6
  start-page: 43
  issue: 4
  year: 2014
  ident: 494_CR52
  publication-title: Int J Netw Sec Appl
– ident: 494_CR77
– volume: 59
  start-page: 117
  year: 2016
  ident: 494_CR81
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2015.06.021
– volume: 22
  start-page: 2461
  issue: 9
  year: 2016
  ident: 494_CR71
  publication-title: Adv Sci Lett
  doi: 10.1166/asl.2016.7790
– ident: 494_CR63
  doi: 10.1007/3-540-60590-8_7
– volume: 49
  start-page: 104
  year: 2015
  ident: 494_CR83
  publication-title: Fut Gen Comp Sys
  doi: 10.1016/j.future.2014.10.010
– start-page: 617
  volume-title: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
  year: 2013
  ident: 494_CR23
  doi: 10.1007/978-3-642-37949-9_54
– ident: 494_CR49
  doi: 10.1109/ISAMSR.2016.7810021
– volume: 15
  start-page: 2801
  issue: 5
  year: 2015
  ident: 494_CR12
  publication-title: IEEE Sens J
  doi: 10.1109/JSEN.2014.2380816
– ident: 494_CR67
– volume: 45
  start-page: 45
  year: 2016
  ident: 494_CR47
  publication-title: Microproc Microsys
  doi: 10.1016/j.micpro.2016.03.011
– volume: 24
  start-page: 34
  issue: 3
  year: 2004
  ident: 494_CR32
  publication-title: IEEE Micro
  doi: 10.1109/MM.2004.11
– volume: 52
  start-page: 95
  year: 2015
  ident: 494_CR48
  publication-title: Fut Gen Comput Sys
  doi: 10.1016/j.future.2014.11.016
– ident: 494_CR10
  doi: 10.1145/2744769.2747946
– ident: 494_CR20
– volume: 8
  start-page: 59
  issue: 2
  year: 2014
  ident: 494_CR46
  publication-title: Int J Sec Appl
– volume: 26
  start-page: 313
  issue: 2
  year: 2013
  ident: 494_CR3
  publication-title: J Crypto
  doi: 10.1007/s00145-012-9125-6
– volume: 91
  start-page: 26
  year: 2015
  ident: 494_CR65
  publication-title: Comp Net
  doi: 10.1016/j.comnet.2015.08.002
– ident: 494_CR35
  doi: 10.1016/j.future.2016.09.021
– volume: 2
  start-page: 170
  issue: 4
  year: 2013
  ident: 494_CR60
  publication-title: Int J Sci Res
– volume: 2016
  start-page: 110
  year: 2016
  ident: 494_CR61
  publication-title: J Sens
  doi: 10.1155/2016/8763528
– ident: 494_CR8
  doi: 10.1109/BigDataSecurity-HPSC-IDS.2016.29
– ident: 494_CR68
  doi: 10.17487/rfc7252
– volume: 6
  start-page: 1
  issue: 1
  year: 2014
  ident: 494_CR72
  publication-title: Wire Sens Netw
  doi: 10.4236/wsn.2014.61001
– volume: 58
  start-page: 73
  year: 2015
  ident: 494_CR54
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2015.09.001
– year: 2016
  ident: 494_CR82
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2016.11.017
– volume: 52
  start-page: 2292
  issue: 12
  year: 2008
  ident: 494_CR84
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2008.04.002
– ident: 494_CR27
  doi: 10.1007/978-3-642-22792-9_13
– volume: 39
  start-page: 190
  issue: 12
  year: 2015
  ident: 494_CR28
  publication-title: J Medi Sys
  doi: 10.1007/s10916-015-0341-0
– volume: 4
  start-page: 1375
  year: 2016
  ident: 494_CR66
  publication-title: IEEE Acc
  doi: 10.1109/ACCESS.2016.2549047
– volume: 17
  start-page: 1
  issue: 1
  year: 2011
  ident: 494_CR44
  publication-title: Wire Net
  doi: 10.1007/s11276-010-0252-4
– volume: 7
  start-page: 51
  issue: 3
  year: 2015
  ident: 494_CR79
  publication-title: IUP J Telecommun
– ident: 494_CR13
  doi: 10.1007/978-3-540-74735-2_31
– year: 2016
  ident: 494_CR70
  publication-title: J Supercomp
  doi: 10.1007/s11227-016-1850-4
– ident: 494_CR5
  doi: 10.1007/978-3-642-15031-9_27
– volume: 72
  start-page: 469
  year: 2015
  ident: 494_CR17
  publication-title: Proced Comput Sci
  doi: 10.1016/j.procs.2015.12.128
– volume: 30
  start-page: 6
  issue: 3
  year: 2013
  ident: 494_CR11
  publication-title: IEEE Des Test
  doi: 10.1109/MDT.2012.2196252
– ident: 494_CR31
  doi: 10.1007/978-3-642-24209-0_10
– ident: 494_CR86
  doi: 10.1109/SOSE.2015.47
– volume: 44
  start-page: 131
  year: 2016
  ident: 494_CR1
  publication-title: Rajshahi Univ J Sci Eng
  doi: 10.3329/rujse.v44i0.30398
– volume: 75
  start-page: 200
  year: 2016
  ident: 494_CR69
  publication-title: J Netw Comp Appl
  doi: 10.1016/j.jnca.2016.09.002
– ident: 494_CR4
  doi: 10.1007/978-3-540-68351-3_15
– ident: 494_CR2
  doi: 10.1109/ARES.2016.40
– ident: 494_CR85
  doi: 10.1109/CCECE.2011.6030408
– ident: 494_CR36
– ident: 494_CR53
  doi: 10.6028/NIST.IR.8114
– ident: 494_CR78
  doi: 10.1109/IAdCC.2014.6779339
– ident: 494_CR51
  doi: 10.5121/csit.2014.4519
– ident: 494_CR41
  doi: 10.1007/978-3-642-33027-8_23
– volume: 2
  start-page: 86
  issue: 1
  year: 2007
  ident: 494_CR30
  publication-title: Int J Wirel Mob Comput
  doi: 10.1504/IJWMC.2007.013798
– volume: 115
  start-page: 359
  issue: 2
  year: 2015
  ident: 494_CR39
  publication-title: Info Proc Lett
  doi: 10.1016/j.ipl.2014.10.010
– volume: 55
  start-page: 26
  issue: 1
  year: 2017
  ident: 494_CR87
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2017.1600363CM
– ident: 494_CR25
  doi: 10.1109/CLOUD.2016.0131
– volume: 78
  start-page: 165
  year: 2016
  ident: 494_CR9
  publication-title: Proced Comput Sci
  doi: 10.1016/j.procs.2016.02.027
– volume: 32
  start-page: 17
  year: 2015
  ident: 494_CR59
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.01.006
– start-page: 29
  volume-title: Proceeding of International Symposium on Applied Reconfigurable Computing
  year: 2011
  ident: 494_CR26
– volume: 37
  start-page: 235
  issue: 2
  year: 2013
  ident: 494_CR43
  publication-title: Microprocess Microsyst
  doi: 10.1016/j.micpro.2012.09.007
– ident: 494_CR75
  doi: 10.1007/11894063_22
– ident: 494_CR15
  doi: 10.1007/978-3-642-23951-9_21
– volume: 24
  start-page: 1
  issue: 6
  year: 2007
  ident: 494_CR21
  publication-title: IEEE Desi Test Comput
  doi: 10.1109/MDT.2007.187
– ident: 494_CR24
  doi: 10.1007/11915034_61
– volume: 7
  start-page: 1
  year: 2016
  ident: 494_CR50
  publication-title: J Converg
– volume: 45
  start-page: 1
  issue: 4
  year: 2013
  ident: 494_CR16
  publication-title: ACM Comput Sur
  doi: 10.1145/2501654.2501655
– ident: 494_CR33
– ident: 494_CR40
  doi: 10.1109/ICIICT.2015.7396103
– volume: 5
  start-page: 8
  issue: 1
  year: 2015
  ident: 494_CR57
  publication-title: Human-centric Comput Inf Sci
  doi: 10.1186/s13673-015-0027-0
– ident: 494_CR18
  doi: 10.1109/ICECCE.2014.7086640
– volume: 25
  start-page: 582
  year: 2016
  ident: 494_CR37
  publication-title: Proc Technol
  doi: 10.1016/j.protcy.2016.08.148
– volume: 7
  start-page: 305
  issue: 3
  year: 2016
  ident: 494_CR58
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-016-0359-2
– ident: 494_CR64
  doi: 10.1007/978-3-540-85893-5_7
– volume: 5
  start-page: 31
  issue: 4
  year: 2016
  ident: 494_CR34
  publication-title: Adv Comput Sci Int J
– ident: 494_CR80
  doi: 10.1007/3-540-60590-8_29
– volume: 2016
  start-page: 1
  year: 2016
  ident: 494_CR42
  publication-title: J Sens
  doi: 10.1155/2016/8085407
– ident: 494_CR55
  doi: 10.1109/IACS.2015.7103204
– volume: 7
  start-page: 2015
  issue: 11
  year: 2014
  ident: 494_CR29
  publication-title: Sec Commun Net
  doi: 10.1002/sec.915
– ident: 494_CR6
  doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.88
– ident: 494_CR14
  doi: 10.1007/978-3-540-85053-3_18
– ident: 494_CR22
SSID ssj0000393111
Score 2.5700293
Snippet There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1625
SubjectTerms Algorithms
Artificial Intelligence
Computational Intelligence
Cryptography
Cybersecurity
Embedded systems
Encryption
Energy consumption
Engineering
Hash based algorithms
Internet of Things
Memory devices
Original Research
Power consumption
Radio frequency
Robotics and Automation
Smartphones
User Interfaces and Human Computer Interaction
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA46PXjxBypOp-TgSQ0mTdqmXmSIQ0GGhwk7CCXNDxVmN9ttsv_eJGs3FPTiuW0o_V7f-_Ley_cAOMWCUWZpAEpoGCMmIo64zDIkNWWRpCFRmZfMf4i7Xd7vJ49Vwq2s2iprn-gdtRpKlyO_tGGJ2lAbxeR69IHc1ChXXa1GaKyCNRJYJ-yKsjFa5FjcuVPiR_A6UXgUEhrXhU1_ei6IQteXECMnkoLY99C05Js_SqQ-8nS2_vvO22Cz4pywPTeSHbCi813w3K6q_3Dg9uefPkUKrc0WM-9FoBi82LXGr-8ltMQW3g97UGnvV65gOSmmenYBZT2KpYQiV3Bhx3vgqXPbu7lD1agFJC3BYyjTLIlpKCXNtOI6IVpQYYSy241AWQqZZFwaokLDaKAkw1yFFEtBmWYcMyPpPmjkw1wfAGikwcRo6wiEYowZLqKIY6loaLAmAW4CXH_lVFY65G4cxiBdKig7YFILTOqASVkTnC0eGc1FOP66uVWDkVb_Y5kukWiC8xrO5eVfFzv8e7EjsBFYkjPv4m6BxriY6GOwLqfjt7I48cb4BTmf5Jw
  priority: 102
  providerName: ProQuest
Title Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
URI https://link.springer.com/article/10.1007/s12652-017-0494-4
https://www.proquest.com/docview/2933273671
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: AAdvanced Technologies & Aerospace Database (subscription)
  customDbUrl:
  eissn: 1868-5145
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0000393111
  issn: 1868-5137
  databaseCode: P5Z
  dateStart: 20100301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1868-5145
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0000393111
  issn: 1868-5137
  databaseCode: K7-
  dateStart: 20100301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1868-5145
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0000393111
  issn: 1868-5137
  databaseCode: BENPR
  dateStart: 20100301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: Springer Standard Collection
  customDbUrl:
  eissn: 1868-5145
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000393111
  issn: 1868-5137
  databaseCode: RSV
  dateStart: 20100301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HfTgW1wfSw6e1EDaJG3Wm4qiKMviCxGhpHmosO5Kuyr-e5Nuu6uigl56aRLKZDr5JjPzDcAGkYwyBwNwg_IYMxkJLFSaYmUoixTlgU4LyvzTuNkU19eNVlnHnVfZ7lVIsrDUw2K3MOI-jSDGntMEs1EY555sxrvo51eDixVfbBoUfXc9EzzmAY2raOZ3q3w-j4Yg80tctDhuDmf-9aGzMF2iS7TbV4c5GDGdeZj6wDm4ALe7ZdQftb1f_lpcjSKnq9lbYT2QbN91s4fe_WOOHKBFx90LpE1hT3ZQ_py9mLdtpKoWLDmSHY0G-rsIl4cHF_tHuGyxgJUDdgynhjkJcqVoarQwjcBIKq3Uzs0ItYOOjVQoG2huGQ21YkRoTomSlBkmCLOKLsFYp9sxy4CssiSwxhkAqRljVsgoEkRpyi0xQUhqQCpBJ6rkH_dtMNrJkDnZCy5xgku84BJWg83BlKc--cZvg9eq3UvK_zBPHJihDqBFcVCDrWq3hq9_XGzlT6NXYTJ0WKefzL0GY73s2azDhHrpPeRZHcb3DpqtszqMnsTYPVv8pl6o7DuSe-JG
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bT9swFD6CggQvbAjQOtjmB_YCWDixnTiTpomrqOgqhIrEA1JwfBlIpe2aAuqf2m-cnSatQII3HnhOchTn3L6cK8AmkYwyBwNwQnmMmYwEFirLsDKURYryQGfFyPxm3GqJy8vkbAb-Vb0wvqyysomFodY95WPku84tUedqozj41f-L_dYon12tVmiMxeLUjB7dL1v-s3Ho-Ps9DI-P2gcnuNwqgJXDMgxnhiUx5UrRzGhhksBIKq3UDlmH2qGlJBPKBppbRkOtGBGaU6IkZYYJwqyiju4szLkjRrwGc_tHrbPzSVTHd7oGxdJfP4Ye84DGVSq16NcLI-4rIWLsx7Jg9tQZThHus6Rs4euOP7y3r_QRlkpUjfbGarAMM6a7Ald7ZX0D6vgIxGMRBEZOKwejwk4i2fnj3n14c5cjB91Ro9dG2hSW8wfK7wcPZrSDVLVsJkeyq9FEU1fh4k0OtAa1bq9rPgGyypLAGmfqpGaMWSGjSBClKbfEBCGpA6m4mqpy0rpf-NFJpzOivSCkThBSLwgpq8PW5JH-eMzIazdvVMxPS4uTp1PO12G7Ep_p5ReJfX6d2DdYOGn_bqbNRut0HRZDB-nGNesbUBsO7s0XmFcPw9t88LVUBQTXby1X_wExBERv
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB7xqFA5lFKouuVRHzi1WDjxJHG4ocIKVLRCLUUcKkWOH4C0za6SXRD_vnY22W1RQUKc_VA0noy_8cx8A7DDJHJ0MICmPEooylhQofKcKsMxVjwKdF5T5p8mvZ64vEzPmj6nVZvt3oYkJzUNnqWpGO0Ntd2bFb6FceRTChLq-U0ozsMiOkfG53R9_3ExfWTxhadB3YPXs8LTKOBJG9n83y7_3k0zwPkgRlpfPd2VF3_0W3jToE5yMFGTVZgzxTtY_ouLcA1-HTTZAKTv_fW7-smUOB0u72urQmT_alDejK5_V8QBXXIyOCfa1HZmn1Tj8tbc7xLVtmapiCw0mer1OvzsHp1_PaZN6wWqHOBDmhtMEx4pxXOjhUkDI7m0Ujv3I9QOUqa5UDbQkUUeaoVM6IgzJTkaFAyt4u9hoRgU5gMQqywLrHGGQWpEtELGsWBK88gyE4SsA6wVeqYaXnLfHqOfzRiVveAyJ7jMCy7DDnyeLhlOSDmemrzZnmTW_J9V5kAOd8AtToIOfGlPbjb86GYfnzX7EyydHXaz05Petw14HTo4NMn33oSFUTk2W_BK3Y5uqnK71to__EbqpA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Advanced+lightweight+encryption+algorithms+for+IoT+devices%3A+survey%2C+challenges+and+solutions&rft.jtitle=Journal+of+ambient+intelligence+and+humanized+computing&rft.au=Singh%2C+Saurabh&rft.au=Sharma%2C+Pradip+Kumar&rft.au=Moon%2C+Seo+Yeon&rft.au=Park%2C+Jong+Hyuk&rft.date=2024-02-01&rft.issn=1868-5137&rft.eissn=1868-5145&rft.volume=15&rft.issue=2&rft.spage=1625&rft.epage=1642&rft_id=info:doi/10.1007%2Fs12652-017-0494-4&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s12652_017_0494_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1868-5137&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1868-5137&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1868-5137&client=summon