End-to-end encryption in resource-constrained IoT device

ASD Alluhaidan, P Prabu - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …

Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

A flexible encryption technique for the internet of things environment

S Medileh, A Laouid, R Euler, A Bounceur… - Ad Hoc Networks, 2020 - Elsevier
IoT promises a new era of connectivity that goes beyond laptops and smart connected
devices to connected vehicles, smart homes, smart cities and connected healthcare. The …

Performance evaluation of IoT encryption algorithms: memory, timing, and energy

S Maitra, D Richards, A Abdelgawad… - 2019 IEEE sensors …, 2019 - ieeexplore.ieee.org
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …

Efficient security algorithm for power-constrained IoT devices

JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques due to their constrained …

A block cipher for resource-constrained IoT devices

M Rana, Q Mamun, R Islam - World Academy of …, 2023 - researchoutput.csu.edu.au
Abstract In the Internet of Things (IoT), many devices are connected and accumulate a sheer
amount of data. These Internet driven raw data need to be transferred securely to the end …

[PDF][PDF] Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices.

HI Mhaibes, MH Abood, AK Farhan - International Journal of …, 2022 - researchgate.net
The internet of things (IoT) revolution has been sparked by the exponential increase in
connected devices caused by recent advances in wireless technology. These embedded …

Low-cost AES-128 implementation for edge devices in IoT applications

S Shanthi Rekha, P Saravanan - Journal of Circuits, Systems and …, 2019 - World Scientific
Internet of Things (IoT) is an ecosystem of connected edge devices that are accessible
through the internet. Recent research focusses on adding more smartness and intelligence …

[PDF][PDF] Toward lightweight cryptography: A survey

M Abujoodeh, L Tamimi, R Tahboub - 2023 - scholar.ppu.edu
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems
that are suitable for devices with limited capabilities. In this paper, a comprehensive …

Encryption as a service for IoT: opportunities, challenges and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …