Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the...
Uloženo v:
| Vydáno v: | Journal of ambient intelligence and humanized computing Ročník 15; číslo 2; s. 1625 - 1642 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.02.2024
Springer Nature B.V |
| Témata: | |
| ISSN: | 1868-5137, 1868-5145 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the heterogeneous environments for IoT, there are many challenges and issues like power consumption of devices, limited battery, memory space, performance cost, and security in the Information Communication Technology (ICT) network. In this paper, we discuss a state-of-art of lightweight cryptographic primitives which include lightweight block ciphers, hash function, stream ciphers, high performance system, and low resources device for IoT environment in details. We analyze many lightweight cryptographic algorithms based on their key size, block size, number of rounds, and structures. In addition, we discuss the security architecture in IoT for constrained device environment, and focus on research challenges, issues and solutions. Finally, a proposed security scheme with a service scenario for an improvement of resource constrained IoT environment and open issues are discussed. |
|---|---|
| AbstractList | There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network. In the heterogeneous environments for IoT, there are many challenges and issues like power consumption of devices, limited battery, memory space, performance cost, and security in the Information Communication Technology (ICT) network. In this paper, we discuss a state-of-art of lightweight cryptographic primitives which include lightweight block ciphers, hash function, stream ciphers, high performance system, and low resources device for IoT environment in details. We analyze many lightweight cryptographic algorithms based on their key size, block size, number of rounds, and structures. In addition, we discuss the security architecture in IoT for constrained device environment, and focus on research challenges, issues and solutions. Finally, a proposed security scheme with a service scenario for an improvement of resource constrained IoT environment and open issues are discussed. |
| Author | Singh, Saurabh Sharma, Pradip Kumar Park, Jong Hyuk Moon, Seo Yeon |
| Author_xml | – sequence: 1 givenname: Saurabh surname: Singh fullname: Singh, Saurabh organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech) – sequence: 2 givenname: Pradip Kumar surname: Sharma fullname: Sharma, Pradip Kumar organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech) – sequence: 3 givenname: Seo Yeon surname: Moon fullname: Moon, Seo Yeon organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech) – sequence: 4 givenname: Jong Hyuk surname: Park fullname: Park, Jong Hyuk email: jhpark1@seoultech.ac.kr organization: Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech) |
| BookMark | eNp9kE1LAzEURYNUsNb-AHcBt47ma5qJu1L8goKbuhNCmrxpp0yTmkwr_ffOMKIg6FvkZXFPcjnnaOCDB4QuKbmhhMjbRNkkZxmhMiNCiUycoCEtJkWWU5EPvu9cnqFxShvSDlecUjpEb1N3MN6Cw3W1Wjcf0J0YvI3HXVMFj029CrFq1tuEyxDxc1hgB4fKQrrDaR8PcLzGdm3qGvwKEjbe4RTqfcemC3RamjrB-GuP0OvD_WL2lM1fHp9n03lmGaciW4JQkufW8iW4AhQFw01pXK4kc0pRtSxsSV1eCs6cFaRwOSfWcAGiIKK0fISu-nd3MbzvITV6E_bRt19qpjhnkk8kbVOyT9kYUopQals1pivaRFPVmhLd2dS9Td3a1J1NLVqS_iJ3sdqaePyXYT2T2myrJv50-hv6BM9digM |
| CitedBy_id | crossref_primary_10_1109_JIOT_2019_2900631 crossref_primary_10_1109_COMST_2020_2997475 crossref_primary_10_1109_ACCESS_2023_3257171 crossref_primary_10_3390_info14120635 crossref_primary_10_2139_ssrn_5363395 crossref_primary_10_1007_s11227_025_07448_8 crossref_primary_10_1109_JIOT_2023_3344677 crossref_primary_10_26634_jes_11_1_18924 crossref_primary_10_1007_s11277_020_07346_7 crossref_primary_10_1109_ACCESS_2021_3052867 crossref_primary_10_1007_s43926_025_00150_4 crossref_primary_10_1007_s11042_021_10896_y crossref_primary_10_1109_JIOT_2018_2846040 crossref_primary_10_3390_cryptography7030041 crossref_primary_10_1109_JAS_2022_106058 crossref_primary_10_1109_ACCESS_2025_3559617 crossref_primary_10_1007_s11042_024_18765_0 crossref_primary_10_1007_s11235_021_00844_4 crossref_primary_10_1007_s12652_018_0850_z crossref_primary_10_3390_electronics13234767 crossref_primary_10_3390_math13050734 crossref_primary_10_1007_s10586_025_05208_0 crossref_primary_10_1145_3586007 crossref_primary_10_3390_su17062386 crossref_primary_10_1109_TIM_2023_3300444 crossref_primary_10_1007_s12652_020_02303_5 crossref_primary_10_3390_iot6020023 crossref_primary_10_1109_TII_2024_3488795 crossref_primary_10_3390_s21010038 crossref_primary_10_1007_s12083_023_01587_6 crossref_primary_10_1088_1402_4896_adc6c8 crossref_primary_10_3390_s24216843 crossref_primary_10_1002_ett_4866 crossref_primary_10_1007_s12652_020_02603_w crossref_primary_10_1007_s12652_020_02782_6 crossref_primary_10_1109_ACCESS_2018_2848586 crossref_primary_10_3390_electronics14030405 crossref_primary_10_1007_s12652_020_02076_x crossref_primary_10_1109_TNSM_2020_2983921 crossref_primary_10_3390_electronics11111762 crossref_primary_10_1155_2021_6632747 crossref_primary_10_3390_electronics11233920 crossref_primary_10_1007_s11042_020_09625_8 crossref_primary_10_1109_TIFS_2025_3551638 crossref_primary_10_1109_TCSII_2022_3185608 crossref_primary_10_1088_1742_6596_1828_1_012101 crossref_primary_10_3390_s23115102 crossref_primary_10_1007_s40747_021_00280_6 crossref_primary_10_1007_s41870_024_02175_4 crossref_primary_10_1007_s10796_023_10383_9 crossref_primary_10_1007_s11277_020_07134_3 crossref_primary_10_4018_IJEHMC_2019100102 crossref_primary_10_1155_2021_2067137 crossref_primary_10_1109_JIOT_2020_3026493 crossref_primary_10_22399_ijcesen_954 crossref_primary_10_1007_s11276_021_02850_5 crossref_primary_10_1007_s42979_021_00941_w crossref_primary_10_1109_ACCESS_2024_3464102 crossref_primary_10_1007_s11042_024_18620_2 crossref_primary_10_51583_IJLTEMAS_2025_140300054 crossref_primary_10_1109_ACCESS_2020_3029847 crossref_primary_10_1007_s42452_021_04156_9 crossref_primary_10_1016_j_jisa_2021_102945 crossref_primary_10_1109_ACCESS_2021_3093442 crossref_primary_10_1109_TII_2021_3067026 crossref_primary_10_1109_JIOT_2023_3341875 crossref_primary_10_1109_OJCOMS_2025_3593311 crossref_primary_10_1109_TC_2020_2972528 crossref_primary_10_1109_JIOT_2022_3167832 crossref_primary_10_1109_ACCESS_2019_2901753 crossref_primary_10_1109_TSC_2025_3586152 crossref_primary_10_1155_2022_6945004 crossref_primary_10_1016_j_matpr_2021_03_151 crossref_primary_10_3390_sym17060881 crossref_primary_10_1109_TIFS_2020_3045318 crossref_primary_10_3390_e26030216 crossref_primary_10_3390_info9010013 crossref_primary_10_1109_ACCESS_2022_3220622 crossref_primary_10_1109_TIFS_2022_3158553 crossref_primary_10_1109_ACCESS_2022_3209148 crossref_primary_10_3390_s25195936 crossref_primary_10_3390_math10060886 crossref_primary_10_1109_ACCESS_2020_3037359 crossref_primary_10_3390_s25165103 crossref_primary_10_1007_s11277_022_09748_1 crossref_primary_10_1007_s12652_020_02403_2 crossref_primary_10_3390_fi17010030 crossref_primary_10_1109_JIOT_2025_3571794 crossref_primary_10_1007_s11042_021_10750_1 crossref_primary_10_1007_s10207_022_00609_3 crossref_primary_10_1007_s12652_020_01694_9 crossref_primary_10_1109_ACCESS_2022_3207472 crossref_primary_10_1007_s40860_020_00116_z crossref_primary_10_1007_s11276_024_03714_4 crossref_primary_10_1109_ACCESS_2019_2912929 crossref_primary_10_1007_s10836_022_05997_x crossref_primary_10_1007_s12652_021_03395_3 crossref_primary_10_1109_COMST_2022_3218527 crossref_primary_10_1007_s11042_018_5660_y crossref_primary_10_3390_s20216131 crossref_primary_10_3390_s24227314 crossref_primary_10_1109_JIOT_2020_3044526 crossref_primary_10_3390_app15020499 crossref_primary_10_1109_JLT_2022_3200307 crossref_primary_10_3390_drones9080583 crossref_primary_10_1007_s11042_022_11996_z crossref_primary_10_1109_TCSS_2021_3082022 crossref_primary_10_1109_JIOT_2018_2796561 crossref_primary_10_1007_s12652_018_1118_3 crossref_primary_10_2478_ias_2025_0002 crossref_primary_10_3390_electronics10212647 crossref_primary_10_3390_app122010192 crossref_primary_10_1145_3703448 crossref_primary_10_1109_ACCESS_2019_2902621 crossref_primary_10_1109_JIOT_2022_3206667 crossref_primary_10_1007_s12652_020_02658_9 crossref_primary_10_1007_s12652_020_02424_x crossref_primary_10_1109_ACCESS_2022_3227449 crossref_primary_10_32604_cmc_2024_057877 crossref_primary_10_1016_j_future_2022_10_011 crossref_primary_10_1080_23742917_2019_1601889 crossref_primary_10_1109_ACCESS_2024_3482991 crossref_primary_10_1007_s11042_021_10564_1 crossref_primary_10_1109_TNSE_2022_3223281 crossref_primary_10_1007_s11276_022_03197_1 crossref_primary_10_3390_app15158704 crossref_primary_10_1007_s12652_018_0998_6 crossref_primary_10_1007_s10462_025_11248_0 crossref_primary_10_1109_ACCESS_2024_3357082 crossref_primary_10_1007_s11042_018_5663_8 |
| Cites_doi | 10.1016/j.micpro.2016.03.011 10.1016/j.comnet.2015.08.002 10.1016/j.adhoc.2015.01.006 10.1016/j.procs.2016.02.027 10.1109/TIFS.2014.2365734 10.1016/j.jnca.2016.09.002 10.1016/j.comnet.2008.04.002 10.1145/2501654.2501655 10.1007/s00145-012-9125-6 10.1007/s12652-016-0359-2 10.1016/j.procs.2015.12.128 10.1007/s11276-010-0252-4 10.1016/j.jnca.2015.06.021 10.1109/JSEN.2014.2380816 10.1109/MM.2004.11 10.1155/2016/8085407 10.1109/ACCESS.2016.2549047 10.3329/rujse.v44i0.30398 10.4236/wsn.2014.61001 10.1016/j.micpro.2012.09.007 10.1166/asl.2016.7790 10.1016/j.future.2014.10.010 10.1155/2016/8763528 10.1016/j.jcss.2016.02.005 10.1016/j.ipl.2014.10.010 10.1109/MDT.2012.2196252 10.1007/s10916-015-0341-0 10.1002/sec.915 10.1016/j.jnca.2016.11.017 10.1016/j.future.2014.11.016 10.1109/MCOM.2017.1600363CM 10.1504/IJWMC.2007.013798 10.1007/978-3-642-37949-9_54 10.1007/s11227-016-1850-4 10.1016/j.jnca.2015.09.001 10.1186/s13673-015-0027-0 10.1016/j.protcy.2016.08.148 10.1007/978-3-540-74619-5_13 10.1007/978-3-540-25937-4_18 10.1007/3-540-60590-8_7 10.1109/ISAMSR.2016.7810021 10.1145/2744769.2747946 10.1016/j.future.2016.09.021 10.1109/BigDataSecurity-HPSC-IDS.2016.29 10.17487/rfc7252 10.1007/978-3-642-22792-9_13 10.1007/978-3-540-74735-2_31 10.1007/978-3-642-15031-9_27 10.1007/978-3-642-24209-0_10 10.1109/SOSE.2015.47 10.1007/978-3-540-68351-3_15 10.1109/ARES.2016.40 10.1109/CCECE.2011.6030408 10.6028/NIST.IR.8114 10.1109/IAdCC.2014.6779339 10.5121/csit.2014.4519 10.1007/978-3-642-33027-8_23 10.1109/CLOUD.2016.0131 10.1007/11894063_22 10.1007/978-3-642-23951-9_21 10.1109/MDT.2007.187 10.1007/11915034_61 10.1109/ICIICT.2015.7396103 10.1109/ICECCE.2014.7086640 10.1007/978-3-540-85893-5_7 10.1007/3-540-60590-8_29 10.1109/IACS.2015.7103204 10.1109/CIT/IUCC/DASC/PICOM.2015.88 10.1007/978-3-540-85053-3_18 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag Berlin Heidelberg 2017 Springer-Verlag Berlin Heidelberg 2017. |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2017 – notice: Springer-Verlag Berlin Heidelberg 2017. |
| DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
| DOI | 10.1007/s12652-017-0494-4 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database AAdvanced Technologies & Aerospace Database (subscription) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: P5Z name: AAdvanced Technologies & Aerospace Database (subscription) url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1868-5145 |
| EndPage | 1642 |
| ExternalDocumentID | 10_1007_s12652_017_0494_4 |
| GrantInformation_xml | – fundername: IITP, Korea government (MISP) grantid: No.B0190-16-2030 |
| GroupedDBID | -EM 06D 0R~ 0VY 1N0 203 29~ 2JY 2VQ 30V 4.4 406 408 409 40D 96X AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH AAZMS ABAKF ABBXA ABDZT ABECU ABFTV ABHQN ABJNI ABJOX ABKCH ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACKNC ACMLO ACOKC ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AENEX AEOHA AEPYU AESKC AETCA AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ANMIH ARAPS AUKKA AXYYD AYJHY BENPR BGLVJ BGNMA BSONS CCPQU CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG F5P FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GQ6 GQ7 GQ8 H13 HCIFZ HF~ HG6 HMJXF HQYDN HRMNR HZ~ I0C IKXTQ IWAJR IXD IZIGR J-C J0Z JBSCW JCJTX JZLTJ K7- KOV LLZTM M4Y NPVJJ NQJWS NU0 O9- O93 O9J P2P P9P PT4 QOS R89 R9I RLLFE ROL RSV S1Z S27 S3B SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TSG U2A UG4 UOJIU UTJUX UZXMN VFIZW W48 WK8 Z45 Z5O Z7R Z7X Z83 Z88 ZMTXR ~A9 AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 8FE 8FG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c2314-be49735cc3bed8e91ea3afad5972d9919b8cf1d5f432dc408d530ca34e4804fc3 |
| IEDL.DBID | RSV |
| ISSN | 1868-5137 |
| IngestDate | Wed Nov 05 02:57:57 EST 2025 Tue Nov 18 22:35:35 EST 2025 Sat Nov 29 03:41:17 EST 2025 Fri Feb 21 02:41:51 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Lightweight cryptography Constrained devices Internet-of-things Symmetric algorithms |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2314-be49735cc3bed8e91ea3afad5972d9919b8cf1d5f432dc408d530ca34e4804fc3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2933273671 |
| PQPubID | 2043913 |
| PageCount | 18 |
| ParticipantIDs | proquest_journals_2933273671 crossref_citationtrail_10_1007_s12652_017_0494_4 crossref_primary_10_1007_s12652_017_0494_4 springer_journals_10_1007_s12652_017_0494_4 |
| PublicationCentury | 2000 |
| PublicationDate | 20240200 2024-02-00 20240201 |
| PublicationDateYYYYMMDD | 2024-02-01 |
| PublicationDate_xml | – month: 2 year: 2024 text: 20240200 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | Journal of ambient intelligence and humanized computing |
| PublicationTitleAbbrev | J Ambient Intell Human Comput |
| PublicationYear | 2024 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | Padmavathi, Kumari (CR60) 2013; 2 Liang, Au, Liu, Susilo, Wong, Yang, Yang (CR48) 2015; 52 Hodjat, Verbauwhede (CR32) 2004; 24 CR36 CR35 Kar, Mishra (CR38) 2016; 12 CR78 CR33 CR77 CR31 CR75 Mushtaque (CR56) 2014; 2 CR74 Ahamad, Abdullah (CR1) 2016; 44 CR73 Bansod, Raval, Pisharoty (CR7) 2015; 10 Latré, Braem, Moerman, Blondia, Demeester (CR44) 2011; 17 Singh, Sharma, Moon, Moon, Park (CR70) 2016 Maity, Park (CR50) 2016; 7 CR2 Hell, Johansson, Meier (CR30) 2007; 2 Sahraoui, Bilami (CR65) 2015; 91 Guo, Wang, Ji, Geng, Xiong (CR28) 2015; 39 CR4 CR6 Kim, Lee, Yi, Park (CR42) 2016; 2016 Nguyen, Laurent, Oualha (CR59) 2015; 32 CR5 CR8 Souissi, Ben-Ammar (CR72) 2014; 6 Hosseinzadeh, Hosseinzadeh (CR34) 2016; 5 CR49 Singh, Sharma, Park (CR71) 2016; 22 Karakoç, Demirci, Harmancı (CR39) 2015; 115 CR45 Yao, Chen, Tian (CR83) 2015; 49 CR86 CR41 CR85 CR40 Tripathi, Agrawal (CR76) 2014; 1 CR80 James, Kumar (CR37) 2016; 25 Fan, Mandal, Gong (CR23) 2013 Hayajneh, Doomun, Al-Mashaqbeh, Mohd (CR29) 2014; 7 Negash, Rahmani, Westerlund, Liljeberg, Tenhunen (CR58) 2016; 7 Aumasson, Henzen, Meier, Naya-Plasencia (CR3) 2013; 26 Sajid, Abbas, Saleem (CR66) 2016; 4 Zhou, Cao, Dong, Vasilakos (CR87) 2017; 55 CR19 CR18 Kitsos, Sklavos, Provelengios, Skodras (CR43) 2013; 37 Grand, Bossuet, Le Gal, Gogniat, Dallet (CR26) 2011 CR15 CR14 CR13 Peng, Du, Li, Li (CR61) 2016; 2016 CR55 CR10 CR53 Buja, Latip (CR17) 2015; 72 Li, Liu, Wang (CR47) 2016; 45 CR51 Eisenbarth, Kumar (CR21) 2007; 24 Verma, Jain, Shrivastava (CR79) 2015; 7 Mohd, Hayajneh, Vasilakos (CR54) 2015; 58 Bhunia, Abramovici, Agrawal, Bradley, Hsiao, MS, Plusquellic, Tehranipoor (CR11) 2013; 30 Singh, Jeong, Park (CR69) 2016; 75 Biswas, Muthukkumarasamy, Singh (CR12) 2015; 15 Yang, Zheng, Tang (CR82) 2016 Naruse, Mohri, Shiraishi (CR57) 2015; 5 CR27 Baskar, Balasubramaniyan, Manivannan (CR9) 2016; 78 CR25 CR24 CR68 CR67 CR22 CR20 CR64 CR63 Lee, Lim (CR46) 2014; 8 Xiao, Wang, Zhu, Wang (CR81) 2016; 59 Puthal, Nepal, Ranjan, Chen (CR62) 2017; 83 Masram, Shahare, Abraham, Moona (CR52) 2014; 6 Yick, Mukherjee, Ghosal (CR84) 2008; 52 Bossuet, Grand, Gaspar, Fischer, Gogniat (CR16) 2013; 45 494_CR80 494_CR41 494_CR85 C Xiao (494_CR81) 2016; 59 494_CR86 494_CR40 M Grand (494_CR26) 2011 494_CR36 JH Lee (494_CR46) 2014; 8 L Bossuet (494_CR16) 2013; 45 494_CR78 494_CR35 B Latré (494_CR44) 2011; 17 J Zhou (494_CR87) 2017; 55 MM Ahamad (494_CR1) 2016; 44 M James (494_CR37) 2016; 25 494_CR2 S Bhunia (494_CR11) 2013; 30 K Biswas (494_CR12) 2015; 15 X Fan (494_CR23) 2013 494_CR4 G Bansod (494_CR7) 2015; 10 494_CR6 R Masram (494_CR52) 2014; 6 494_CR5 494_CR8 494_CR10 T Hayajneh (494_CR29) 2014; 7 494_CR55 494_CR53 494_CR51 R Tripathi (494_CR76) 2014; 1 M Hell (494_CR30) 2007; 2 J Hosseinzadeh (494_CR34) 2016; 5 494_CR49 KT Nguyen (494_CR59) 2015; 32 J Yick (494_CR84) 2008; 52 494_CR45 T Naruse (494_CR57) 2015; 5 S Maity (494_CR50) 2016; 7 S Singh (494_CR69) 2016; 75 F Karakoç (494_CR39) 2015; 115 L Li (494_CR47) 2016; 45 T Eisenbarth (494_CR21) 2007; 24 494_CR22 K Liang (494_CR48) 2015; 52 494_CR63 X Yao (494_CR83) 2015; 49 494_CR20 494_CR64 MA Mushtaque (494_CR56) 2014; 2 P Guo (494_CR28) 2015; 39 C Peng (494_CR61) 2016; 2016 494_CR18 494_CR19 D Puthal (494_CR62) 2017; 83 494_CR14 C Baskar (494_CR9) 2016; 78 494_CR15 P Kitsos (494_CR43) 2013; 37 494_CR13 R Souissi (494_CR72) 2014; 6 AG Buja (494_CR17) 2015; 72 JM Kim (494_CR42) 2016; 2016 S Sahraoui (494_CR65) 2015; 91 B Padmavathi (494_CR60) 2013; 2 S Singh (494_CR70) 2016 A Hodjat (494_CR32) 2004; 24 494_CR33 A Sajid (494_CR66) 2016; 4 494_CR77 494_CR74 494_CR31 494_CR75 494_CR73 JP Aumasson (494_CR3) 2013; 26 494_CR27 494_CR25 Y Yang (494_CR82) 2016 494_CR67 S Singh (494_CR71) 2016; 22 494_CR24 494_CR68 D Verma (494_CR79) 2015; 7 BJ Mohd (494_CR54) 2015; 58 B Negash (494_CR58) 2016; 7 J Kar (494_CR38) 2016; 12 |
| References_xml | – ident: CR45 – ident: CR22 – volume: 45 start-page: 45 year: 2016 end-page: 55 ident: CR47 article-title: QTL: a new ultra-lightweight block cipher publication-title: Microproc Microsys doi: 10.1016/j.micpro.2016.03.011 – ident: CR49 – ident: CR68 – ident: CR74 – ident: CR4 – volume: 91 start-page: 26 year: 2015 end-page: 45 ident: CR65 article-title: Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things publication-title: Comp Net doi: 10.1016/j.comnet.2015.08.002 – volume: 5 start-page: 31 issue: 4 year: 2016 end-page: 41 ident: CR34 article-title: A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation publication-title: Adv Comput Sci Int J – volume: 8 start-page: 59 issue: 2 year: 2014 end-page: 66 ident: CR46 article-title: Parallel architecture for high-speed block cipher, HIGHT publication-title: Int J Sec Appl – ident: CR51 – volume: 32 start-page: 17 year: 2015 end-page: 31 ident: CR59 article-title: Survey on secure communication protocols for the internet of things publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.01.006 – start-page: 29 year: 2011 end-page: 40 ident: CR26 article-title: Design and implementation of a multi-core crypto-processor for software defined radios publication-title: Proceeding of International Symposium on Applied Reconfigurable Computing – volume: 78 start-page: 165 year: 2016 end-page: 171 ident: CR9 article-title: Establishment of light weight cryptography for resource constraint environment using FPGA publication-title: Proced Comput Sci doi: 10.1016/j.procs.2016.02.027 – ident: CR35 – ident: CR80 – volume: 7 start-page: 1 year: 2016 end-page: 18 ident: CR50 article-title: Powering IoT devices: a novel design and analysis technique publication-title: J Converg – volume: 2 start-page: 170 issue: 4 year: 2013 end-page: 174 ident: CR60 article-title: A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution publication-title: Int J Sci Res – ident: CR77 – ident: CR8 – ident: CR25 – volume: 10 start-page: 142 issue: 1 year: 2015 end-page: 151 ident: CR7 article-title: Implementation of a new lightweight encryption design for embedded security publication-title: IEEE Trans Inf Forens Sec doi: 10.1109/TIFS.2014.2365734 – volume: 75 start-page: 200 year: 2016 end-page: 222 ident: CR69 article-title: A survey on cloud computing security: issues, threats, and solutions publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2016.09.002 – volume: 52 start-page: 2292 issue: 12 year: 2008 end-page: 2330 ident: CR84 article-title: Wireless sensor network survey publication-title: Comput Netw doi: 10.1016/j.comnet.2008.04.002 – volume: 45 start-page: 1 issue: 4 year: 2013 end-page: 41 ident: CR16 article-title: Architectures of flexible symmetric key crypto engines—a survey: from hardware coprocessor to multi-crypto-processor system on chip publication-title: ACM Comput Sur doi: 10.1145/2501654.2501655 – volume: 26 start-page: 313 issue: 2 year: 2013 end-page: 339 ident: CR3 article-title: Quark: a lightweight hash publication-title: J Crypto doi: 10.1007/s00145-012-9125-6 – ident: CR19 – volume: 7 start-page: 305 issue: 3 year: 2016 end-page: 319 ident: CR58 article-title: LISA 2.0: lightweight internet of things service bus architecture using node centric networking publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-016-0359-2 – volume: 12 start-page: 226 issue: 2 year: 2016 end-page: 233 ident: CR38 article-title: Mitigating threats and security metrics in cloud computing publication-title: J Inf Process Sys – ident: CR67 – ident: CR75 – ident: CR15 – volume: 72 start-page: 469 year: 2015 end-page: 476 ident: CR17 article-title: The direction of lightweight ciphers in mobile big data computing publication-title: Proced Comput Sci doi: 10.1016/j.procs.2015.12.128 – volume: 17 start-page: 1 issue: 1 year: 2011 end-page: 18 ident: CR44 article-title: A survey on wireless body area networks publication-title: Wire Net doi: 10.1007/s11276-010-0252-4 – volume: 59 start-page: 117 year: 2016 end-page: 125 ident: CR81 article-title: A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2015.06.021 – volume: 15 start-page: 2801 issue: 5 year: 2015 end-page: 2809 ident: CR12 article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks publication-title: IEEE Sens J doi: 10.1109/JSEN.2014.2380816 – volume: 24 start-page: 34 issue: 3 year: 2004 end-page: 45 ident: CR32 article-title: High-throughput programmable crypto co-processor publication-title: IEEE Micro doi: 10.1109/MM.2004.11 – ident: CR36 – volume: 2016 start-page: 1 year: 2016 end-page: 10 ident: CR42 article-title: Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks publication-title: J Sens doi: 10.1155/2016/8085407 – ident: CR78 – ident: CR85 – ident: CR5 – ident: CR64 – volume: 4 start-page: 1375 year: 2016 end-page: 1384 ident: CR66 article-title: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges publication-title: IEEE Acc doi: 10.1109/ACCESS.2016.2549047 – volume: 44 start-page: 131 year: 2016 end-page: 139 ident: CR1 article-title: Comparison of encryption algorithms for multimedia publication-title: Rajshahi Univ J Sci Eng doi: 10.3329/rujse.v44i0.30398 – volume: 6 start-page: 1 issue: 1 year: 2014 end-page: 7 ident: CR72 article-title: An intelligent wireless sensor network temperature acquisition system with an FPGA publication-title: Wire Sens Netw doi: 10.4236/wsn.2014.61001 – volume: 24 start-page: 1 issue: 6 year: 2007 end-page: 12 ident: CR21 article-title: A survey of lightweight-cryptography implementations publication-title: IEEE Desi Test Comput – volume: 37 start-page: 235 issue: 2 year: 2013 end-page: 245 ident: CR43 article-title: FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0 publication-title: Microprocess Microsyst doi: 10.1016/j.micpro.2012.09.007 – volume: 22 start-page: 2461 issue: 9 year: 2016 end-page: 2464 ident: CR71 article-title: Secure clouds forensic investigative architecture for social network cloud publication-title: Adv Sci Lett doi: 10.1166/asl.2016.7790 – volume: 49 start-page: 104 year: 2015 end-page: 112 ident: CR83 article-title: A lightweight attribute-based encryption scheme for the Internet of Things publication-title: Fut Gen Comp Sys doi: 10.1016/j.future.2014.10.010 – volume: 2016 start-page: 110 year: 2016 ident: CR61 article-title: An ultra-lightweight encryption scheme in underwater acoustic networks publication-title: J Sens doi: 10.1155/2016/8763528 – ident: CR18 – volume: 2 start-page: 76 issue: 4 year: 2014 end-page: 82 ident: CR56 article-title: Comparative analysis on different parameters of encryption algorithms for information security publication-title: JCSE Int J Comput Sci – volume: 83 start-page: 22 issue: 1 year: 2017 end-page: 42 ident: CR62 article-title: A dynamic prime number based efficient security mechanism for big sensing data streams publication-title: J Comp Syst Sci doi: 10.1016/j.jcss.2016.02.005 – ident: CR14 – volume: 115 start-page: 359 issue: 2 year: 2015 end-page: 367 ident: CR39 article-title: AKF: A key alternating Feistel scheme for lightweight cipher designs publication-title: Info Proc Lett doi: 10.1016/j.ipl.2014.10.010 – ident: CR2 – ident: CR53 – ident: CR10 – ident: CR33 – volume: 7 start-page: 51 issue: 3 year: 2015 end-page: 65 ident: CR79 article-title: Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks publication-title: IUP J Telecommun – ident: CR6 – volume: 30 start-page: 6 issue: 3 year: 2013 end-page: 17 ident: CR11 article-title: Protection against hardware trojan attacks: towards a comprehensive solution publication-title: IEEE Des Test doi: 10.1109/MDT.2012.2196252 – ident: CR86 – volume: 39 start-page: 190 issue: 12 year: 2015 end-page: 198 ident: CR28 article-title: A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks publication-title: J Medi Sys doi: 10.1007/s10916-015-0341-0 – ident: CR40 – ident: CR63 – ident: CR27 – volume: 1 start-page: 68 issue: 6 year: 2014 end-page: 76 ident: CR76 article-title: Comparative study of symmetric and asymmetric cryptography techniques publication-title: Int J Adv Found Res Comp – volume: 7 start-page: 2015 issue: 11 year: 2014 end-page: 2038 ident: CR29 article-title: An energy-efficient and security aware route selection protocol for wireless sensor networks publication-title: Sec Commun Net doi: 10.1002/sec.915 – year: 2016 ident: CR82 article-title: Lightweight distributed secure data management system for health internet of things publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2016.11.017 – ident: CR73 – volume: 52 start-page: 95 year: 2015 end-page: 108 ident: CR48 article-title: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing publication-title: Fut Gen Comput Sys doi: 10.1016/j.future.2014.11.016 – volume: 55 start-page: 26 issue: 1 year: 2017 end-page: 33 ident: CR87 article-title: Security and privacy for cloud-based IoT: challenges publication-title: IEEE Commun Mag doi: 10.1109/MCOM.2017.1600363CM – ident: CR31 – ident: CR13 – volume: 2 start-page: 86 issue: 1 year: 2007 end-page: 93 ident: CR30 article-title: Grain: a stream cipher for constrained environments publication-title: Int J Wirel Mob Comput doi: 10.1504/IJWMC.2007.013798 – ident: CR55 – volume: 6 start-page: 43 issue: 4 year: 2014 end-page: 52 ident: CR52 article-title: Analysis and comparison of symmetric key cryptographic algorithms based on various file features publication-title: Int J Netw Sec Appl – start-page: 617 year: 2013 end-page: 632 ident: CR23 article-title: Wg-8: a lightweight stream cipher for resource-constrained smart devices publication-title: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness doi: 10.1007/978-3-642-37949-9_54 – ident: CR41 – year: 2016 ident: CR70 article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions publication-title: J Supercomp doi: 10.1007/s11227-016-1850-4 – ident: CR24 – volume: 58 start-page: 73 year: 2015 end-page: 93 ident: CR54 article-title: A survey on lightweight block ciphers for low-resource devices: comparative study and open issues publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2015.09.001 – volume: 5 start-page: 8 issue: 1 year: 2015 end-page: 25 ident: CR57 article-title: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating publication-title: Human-centric Comput Inf Sci doi: 10.1186/s13673-015-0027-0 – ident: CR20 – volume: 25 start-page: 582 year: 2016 end-page: 589 ident: CR37 article-title: An implementation of modified lightweight advanced encryption standard in FPGA publication-title: Proc Technol doi: 10.1016/j.protcy.2016.08.148 – volume: 12 start-page: 226 issue: 2 year: 2016 ident: 494_CR38 publication-title: J Inf Process Sys – volume: 2 start-page: 76 issue: 4 year: 2014 ident: 494_CR56 publication-title: JCSE Int J Comput Sci – volume: 83 start-page: 22 issue: 1 year: 2017 ident: 494_CR62 publication-title: J Comp Syst Sci doi: 10.1016/j.jcss.2016.02.005 – volume: 1 start-page: 68 issue: 6 year: 2014 ident: 494_CR76 publication-title: Int J Adv Found Res Comp – ident: 494_CR19 – volume: 10 start-page: 142 issue: 1 year: 2015 ident: 494_CR7 publication-title: IEEE Trans Inf Forens Sec doi: 10.1109/TIFS.2014.2365734 – ident: 494_CR45 doi: 10.1007/978-3-540-74619-5_13 – ident: 494_CR73 – ident: 494_CR74 doi: 10.1007/978-3-540-25937-4_18 – volume: 6 start-page: 43 issue: 4 year: 2014 ident: 494_CR52 publication-title: Int J Netw Sec Appl – ident: 494_CR77 – volume: 59 start-page: 117 year: 2016 ident: 494_CR81 publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2015.06.021 – volume: 22 start-page: 2461 issue: 9 year: 2016 ident: 494_CR71 publication-title: Adv Sci Lett doi: 10.1166/asl.2016.7790 – ident: 494_CR63 doi: 10.1007/3-540-60590-8_7 – volume: 49 start-page: 104 year: 2015 ident: 494_CR83 publication-title: Fut Gen Comp Sys doi: 10.1016/j.future.2014.10.010 – start-page: 617 volume-title: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness year: 2013 ident: 494_CR23 doi: 10.1007/978-3-642-37949-9_54 – ident: 494_CR49 doi: 10.1109/ISAMSR.2016.7810021 – volume: 15 start-page: 2801 issue: 5 year: 2015 ident: 494_CR12 publication-title: IEEE Sens J doi: 10.1109/JSEN.2014.2380816 – ident: 494_CR67 – volume: 45 start-page: 45 year: 2016 ident: 494_CR47 publication-title: Microproc Microsys doi: 10.1016/j.micpro.2016.03.011 – volume: 24 start-page: 34 issue: 3 year: 2004 ident: 494_CR32 publication-title: IEEE Micro doi: 10.1109/MM.2004.11 – volume: 52 start-page: 95 year: 2015 ident: 494_CR48 publication-title: Fut Gen Comput Sys doi: 10.1016/j.future.2014.11.016 – ident: 494_CR10 doi: 10.1145/2744769.2747946 – ident: 494_CR20 – volume: 8 start-page: 59 issue: 2 year: 2014 ident: 494_CR46 publication-title: Int J Sec Appl – volume: 26 start-page: 313 issue: 2 year: 2013 ident: 494_CR3 publication-title: J Crypto doi: 10.1007/s00145-012-9125-6 – volume: 91 start-page: 26 year: 2015 ident: 494_CR65 publication-title: Comp Net doi: 10.1016/j.comnet.2015.08.002 – ident: 494_CR35 doi: 10.1016/j.future.2016.09.021 – volume: 2 start-page: 170 issue: 4 year: 2013 ident: 494_CR60 publication-title: Int J Sci Res – volume: 2016 start-page: 110 year: 2016 ident: 494_CR61 publication-title: J Sens doi: 10.1155/2016/8763528 – ident: 494_CR8 doi: 10.1109/BigDataSecurity-HPSC-IDS.2016.29 – ident: 494_CR68 doi: 10.17487/rfc7252 – volume: 6 start-page: 1 issue: 1 year: 2014 ident: 494_CR72 publication-title: Wire Sens Netw doi: 10.4236/wsn.2014.61001 – volume: 58 start-page: 73 year: 2015 ident: 494_CR54 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2015.09.001 – year: 2016 ident: 494_CR82 publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2016.11.017 – volume: 52 start-page: 2292 issue: 12 year: 2008 ident: 494_CR84 publication-title: Comput Netw doi: 10.1016/j.comnet.2008.04.002 – ident: 494_CR27 doi: 10.1007/978-3-642-22792-9_13 – volume: 39 start-page: 190 issue: 12 year: 2015 ident: 494_CR28 publication-title: J Medi Sys doi: 10.1007/s10916-015-0341-0 – volume: 4 start-page: 1375 year: 2016 ident: 494_CR66 publication-title: IEEE Acc doi: 10.1109/ACCESS.2016.2549047 – volume: 17 start-page: 1 issue: 1 year: 2011 ident: 494_CR44 publication-title: Wire Net doi: 10.1007/s11276-010-0252-4 – volume: 7 start-page: 51 issue: 3 year: 2015 ident: 494_CR79 publication-title: IUP J Telecommun – ident: 494_CR13 doi: 10.1007/978-3-540-74735-2_31 – year: 2016 ident: 494_CR70 publication-title: J Supercomp doi: 10.1007/s11227-016-1850-4 – ident: 494_CR5 doi: 10.1007/978-3-642-15031-9_27 – volume: 72 start-page: 469 year: 2015 ident: 494_CR17 publication-title: Proced Comput Sci doi: 10.1016/j.procs.2015.12.128 – volume: 30 start-page: 6 issue: 3 year: 2013 ident: 494_CR11 publication-title: IEEE Des Test doi: 10.1109/MDT.2012.2196252 – ident: 494_CR31 doi: 10.1007/978-3-642-24209-0_10 – ident: 494_CR86 doi: 10.1109/SOSE.2015.47 – volume: 44 start-page: 131 year: 2016 ident: 494_CR1 publication-title: Rajshahi Univ J Sci Eng doi: 10.3329/rujse.v44i0.30398 – volume: 75 start-page: 200 year: 2016 ident: 494_CR69 publication-title: J Netw Comp Appl doi: 10.1016/j.jnca.2016.09.002 – ident: 494_CR4 doi: 10.1007/978-3-540-68351-3_15 – ident: 494_CR2 doi: 10.1109/ARES.2016.40 – ident: 494_CR85 doi: 10.1109/CCECE.2011.6030408 – ident: 494_CR36 – ident: 494_CR53 doi: 10.6028/NIST.IR.8114 – ident: 494_CR78 doi: 10.1109/IAdCC.2014.6779339 – ident: 494_CR51 doi: 10.5121/csit.2014.4519 – ident: 494_CR41 doi: 10.1007/978-3-642-33027-8_23 – volume: 2 start-page: 86 issue: 1 year: 2007 ident: 494_CR30 publication-title: Int J Wirel Mob Comput doi: 10.1504/IJWMC.2007.013798 – volume: 115 start-page: 359 issue: 2 year: 2015 ident: 494_CR39 publication-title: Info Proc Lett doi: 10.1016/j.ipl.2014.10.010 – volume: 55 start-page: 26 issue: 1 year: 2017 ident: 494_CR87 publication-title: IEEE Commun Mag doi: 10.1109/MCOM.2017.1600363CM – ident: 494_CR25 doi: 10.1109/CLOUD.2016.0131 – volume: 78 start-page: 165 year: 2016 ident: 494_CR9 publication-title: Proced Comput Sci doi: 10.1016/j.procs.2016.02.027 – volume: 32 start-page: 17 year: 2015 ident: 494_CR59 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.01.006 – start-page: 29 volume-title: Proceeding of International Symposium on Applied Reconfigurable Computing year: 2011 ident: 494_CR26 – volume: 37 start-page: 235 issue: 2 year: 2013 ident: 494_CR43 publication-title: Microprocess Microsyst doi: 10.1016/j.micpro.2012.09.007 – ident: 494_CR75 doi: 10.1007/11894063_22 – ident: 494_CR15 doi: 10.1007/978-3-642-23951-9_21 – volume: 24 start-page: 1 issue: 6 year: 2007 ident: 494_CR21 publication-title: IEEE Desi Test Comput doi: 10.1109/MDT.2007.187 – ident: 494_CR24 doi: 10.1007/11915034_61 – volume: 7 start-page: 1 year: 2016 ident: 494_CR50 publication-title: J Converg – volume: 45 start-page: 1 issue: 4 year: 2013 ident: 494_CR16 publication-title: ACM Comput Sur doi: 10.1145/2501654.2501655 – ident: 494_CR33 – ident: 494_CR40 doi: 10.1109/ICIICT.2015.7396103 – volume: 5 start-page: 8 issue: 1 year: 2015 ident: 494_CR57 publication-title: Human-centric Comput Inf Sci doi: 10.1186/s13673-015-0027-0 – ident: 494_CR18 doi: 10.1109/ICECCE.2014.7086640 – volume: 25 start-page: 582 year: 2016 ident: 494_CR37 publication-title: Proc Technol doi: 10.1016/j.protcy.2016.08.148 – volume: 7 start-page: 305 issue: 3 year: 2016 ident: 494_CR58 publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-016-0359-2 – ident: 494_CR64 doi: 10.1007/978-3-540-85893-5_7 – volume: 5 start-page: 31 issue: 4 year: 2016 ident: 494_CR34 publication-title: Adv Comput Sci Int J – ident: 494_CR80 doi: 10.1007/3-540-60590-8_29 – volume: 2016 start-page: 1 year: 2016 ident: 494_CR42 publication-title: J Sens doi: 10.1155/2016/8085407 – ident: 494_CR55 doi: 10.1109/IACS.2015.7103204 – volume: 7 start-page: 2015 issue: 11 year: 2014 ident: 494_CR29 publication-title: Sec Commun Net doi: 10.1002/sec.915 – ident: 494_CR6 doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.88 – ident: 494_CR14 doi: 10.1007/978-3-540-85053-3_18 – ident: 494_CR22 |
| SSID | ssj0000393111 |
| Score | 2.5700293 |
| Snippet | There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks. Nowadays, Internet of Things... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1625 |
| SubjectTerms | Algorithms Artificial Intelligence Computational Intelligence Cryptography Cybersecurity Embedded systems Encryption Energy consumption Engineering Hash based algorithms Internet of Things Memory devices Original Research Power consumption Radio frequency Robotics and Automation Smartphones User Interfaces and Human Computer Interaction |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA46PXjxBypOp-TgSQ0mTdqmXmSIQ0GGhwk7CCXNDxVmN9ttsv_eJGs3FPTiuW0o_V7f-_Ley_cAOMWCUWZpAEpoGCMmIo64zDIkNWWRpCFRmZfMf4i7Xd7vJ49Vwq2s2iprn-gdtRpKlyO_tGGJ2lAbxeR69IHc1ChXXa1GaKyCNRJYJ-yKsjFa5FjcuVPiR_A6UXgUEhrXhU1_ei6IQteXECMnkoLY99C05Js_SqQ-8nS2_vvO22Cz4pywPTeSHbCi813w3K6q_3Dg9uefPkUKrc0WM-9FoBi82LXGr-8ltMQW3g97UGnvV65gOSmmenYBZT2KpYQiV3Bhx3vgqXPbu7lD1agFJC3BYyjTLIlpKCXNtOI6IVpQYYSy241AWQqZZFwaokLDaKAkw1yFFEtBmWYcMyPpPmjkw1wfAGikwcRo6wiEYowZLqKIY6loaLAmAW4CXH_lVFY65G4cxiBdKig7YFILTOqASVkTnC0eGc1FOP66uVWDkVb_Y5kukWiC8xrO5eVfFzv8e7EjsBFYkjPv4m6BxriY6GOwLqfjt7I48cb4BTmf5Jw priority: 102 providerName: ProQuest |
| Title | Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions |
| URI | https://link.springer.com/article/10.1007/s12652-017-0494-4 https://www.proquest.com/docview/2933273671 |
| Volume | 15 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: AAdvanced Technologies & Aerospace Database (subscription) customDbUrl: eissn: 1868-5145 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0000393111 issn: 1868-5137 databaseCode: P5Z dateStart: 20100301 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1868-5145 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0000393111 issn: 1868-5137 databaseCode: K7- dateStart: 20100301 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1868-5145 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0000393111 issn: 1868-5137 databaseCode: BENPR dateStart: 20100301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Standard Collection customDbUrl: eissn: 1868-5145 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000393111 issn: 1868-5137 databaseCode: RSV dateStart: 20100301 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HfTgW1wfSw6e1EDaJG3Wm4qiKMviCxGhpHmosO5Kuyr-e5Nuu6uigl56aRLKZDr5JjPzDcAGkYwyBwNwg_IYMxkJLFSaYmUoixTlgU4LyvzTuNkU19eNVlnHnVfZ7lVIsrDUw2K3MOI-jSDGntMEs1EY555sxrvo51eDixVfbBoUfXc9EzzmAY2raOZ3q3w-j4Yg80tctDhuDmf-9aGzMF2iS7TbV4c5GDGdeZj6wDm4ALe7ZdQftb1f_lpcjSKnq9lbYT2QbN91s4fe_WOOHKBFx90LpE1hT3ZQ_py9mLdtpKoWLDmSHY0G-rsIl4cHF_tHuGyxgJUDdgynhjkJcqVoarQwjcBIKq3Uzs0ItYOOjVQoG2huGQ21YkRoTomSlBkmCLOKLsFYp9sxy4CssiSwxhkAqRljVsgoEkRpyi0xQUhqQCpBJ6rkH_dtMNrJkDnZCy5xgku84BJWg83BlKc--cZvg9eq3UvK_zBPHJihDqBFcVCDrWq3hq9_XGzlT6NXYTJ0WKefzL0GY73s2azDhHrpPeRZHcb3DpqtszqMnsTYPVv8pl6o7DuSe-JG |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bT9swFD6CggQvbAjQOtjmB_YCWDixnTiTpomrqOgqhIrEA1JwfBlIpe2aAuqf2m-cnSatQII3HnhOchTn3L6cK8AmkYwyBwNwQnmMmYwEFirLsDKURYryQGfFyPxm3GqJy8vkbAb-Vb0wvqyysomFodY95WPku84tUedqozj41f-L_dYon12tVmiMxeLUjB7dL1v-s3Ho-Ps9DI-P2gcnuNwqgJXDMgxnhiUx5UrRzGhhksBIKq3UDlmH2qGlJBPKBppbRkOtGBGaU6IkZYYJwqyiju4szLkjRrwGc_tHrbPzSVTHd7oGxdJfP4Ye84DGVSq16NcLI-4rIWLsx7Jg9tQZThHus6Rs4euOP7y3r_QRlkpUjfbGarAMM6a7Ald7ZX0D6vgIxGMRBEZOKwejwk4i2fnj3n14c5cjB91Ro9dG2hSW8wfK7wcPZrSDVLVsJkeyq9FEU1fh4k0OtAa1bq9rPgGyypLAGmfqpGaMWSGjSBClKbfEBCGpA6m4mqpy0rpf-NFJpzOivSCkThBSLwgpq8PW5JH-eMzIazdvVMxPS4uTp1PO12G7Ep_p5ReJfX6d2DdYOGn_bqbNRut0HRZDB-nGNesbUBsO7s0XmFcPw9t88LVUBQTXby1X_wExBERv |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB7xqFA5lFKouuVRHzi1WDjxJHG4ocIKVLRCLUUcKkWOH4C0za6SXRD_vnY22W1RQUKc_VA0noy_8cx8A7DDJHJ0MICmPEooylhQofKcKsMxVjwKdF5T5p8mvZ64vEzPmj6nVZvt3oYkJzUNnqWpGO0Ntd2bFb6FceRTChLq-U0ozsMiOkfG53R9_3ExfWTxhadB3YPXs8LTKOBJG9n83y7_3k0zwPkgRlpfPd2VF3_0W3jToE5yMFGTVZgzxTtY_ouLcA1-HTTZAKTv_fW7-smUOB0u72urQmT_alDejK5_V8QBXXIyOCfa1HZmn1Tj8tbc7xLVtmapiCw0mer1OvzsHp1_PaZN6wWqHOBDmhtMEx4pxXOjhUkDI7m0Ujv3I9QOUqa5UDbQkUUeaoVM6IgzJTkaFAyt4u9hoRgU5gMQqywLrHGGQWpEtELGsWBK88gyE4SsA6wVeqYaXnLfHqOfzRiVveAyJ7jMCy7DDnyeLhlOSDmemrzZnmTW_J9V5kAOd8AtToIOfGlPbjb86GYfnzX7EyydHXaz05Petw14HTo4NMn33oSFUTk2W_BK3Y5uqnK71to__EbqpA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Advanced+lightweight+encryption+algorithms+for+IoT+devices%3A+survey%2C+challenges+and+solutions&rft.jtitle=Journal+of+ambient+intelligence+and+humanized+computing&rft.au=Singh%2C+Saurabh&rft.au=Sharma%2C+Pradip+Kumar&rft.au=Moon%2C+Seo+Yeon&rft.au=Park%2C+Jong+Hyuk&rft.date=2024-02-01&rft.issn=1868-5137&rft.eissn=1868-5145&rft.volume=15&rft.issue=2&rft.spage=1625&rft.epage=1642&rft_id=info:doi/10.1007%2Fs12652-017-0494-4&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s12652_017_0494_4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1868-5137&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1868-5137&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1868-5137&client=summon |