End-to-end encryption in resource-constrained IoT device
ASD Alluhaidan, P Prabu - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …
regardless of their local network and resource capacities. Ensuring the security …
Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
A flexible encryption technique for the internet of things environment
IoT promises a new era of connectivity that goes beyond laptops and smart connected
devices to connected vehicles, smart homes, smart cities and connected healthcare. The …
devices to connected vehicles, smart homes, smart cities and connected healthcare. The …
Performance evaluation of IoT encryption algorithms: memory, timing, and energy
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
Efficient security algorithm for power-constrained IoT devices
JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques due to their constrained …
do not exactly fit into the provision of existing security techniques due to their constrained …
A block cipher for resource-constrained IoT devices
M Rana, Q Mamun, R Islam - World Academy of …, 2023 - researchoutput.csu.edu.au
Abstract In the Internet of Things (IoT), many devices are connected and accumulate a sheer
amount of data. These Internet driven raw data need to be transferred securely to the end …
amount of data. These Internet driven raw data need to be transferred securely to the end …
[PDF][PDF] Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices.
The internet of things (IoT) revolution has been sparked by the exponential increase in
connected devices caused by recent advances in wireless technology. These embedded …
connected devices caused by recent advances in wireless technology. These embedded …
Low-cost AES-128 implementation for edge devices in IoT applications
S Shanthi Rekha, P Saravanan - Journal of Circuits, Systems and …, 2019 - World Scientific
Internet of Things (IoT) is an ecosystem of connected edge devices that are accessible
through the internet. Recent research focusses on adding more smartness and intelligence …
through the internet. Recent research focusses on adding more smartness and intelligence …
[PDF][PDF] Toward lightweight cryptography: A survey
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems
that are suitable for devices with limited capabilities. In this paper, a comprehensive …
that are suitable for devices with limited capabilities. In this paper, a comprehensive …
Encryption as a service for IoT: opportunities, challenges and solutions
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …