A distributed security mechanism for resource-constrained IoT devices

J King, AI Awad - Informatica, 2016 - informatica.si
Abstract Internet of Things (IoT) devices have grown up to comprise embedded systems and
sensors with the ability to connect, collect, and transmit data over the Internet. Although …

Secure lightweight cryptosystem for IoT and pervasive computing

M Abutaha, B Atawneh, L Hammouri, G Kaddoum - Scientific Reports, 2022 - nature.com
Large volumes of sensitive data are being transferred among devices as the Internet of
Things (IoT) grows in popularity. As a result, security measures must be implemented to …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …

Reconfigurable security: Edge-computing-based framework for IoT

RH Hsu, J Lee, TQS Quek, JC Chen - IEEE Network, 2018 - ieeexplore.ieee.org
In various scenarios, achieving security between IoT devices is challenging since the
devices may have different dedicated communication standards and resource constraints as …

Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device

B Tsao, Y Liu, B Dezfouli - Proceedings of the 16th EAI International …, 2019 - dl.acm.org
With the proliferation of IoT, securing the abundance of devices is critical. The current IoT
and security landscapes lack empirical evidence on algorithms optimized for constrained …

Scalable and efficient hardware architectures for authenticated encryption in IoT applications

S Khan, WK Lee, SO Hwang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …

An efficient lightweight cryptographic algorithm for IoT security

M Abdulraheem, JB Awotunde, RG Jimoh… - … on Information and …, 2020 - Springer
To perform various tasks, different devices are interconnected and interact in several
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …

Secure and lightweight encryption model for IoT surveillance camera

M Abbas Fadhil Al-Husainy… - International Journal of …, 2020 - papers.ssrn.com
We are witnessing the era of Internet of Things (IoT), where its applications such as smart
cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras …

Low-cost standard public key cryptography services for wireless iot systems

MO Ozmen, AA Yavuz - Proceedings of the 2017 Workshop on Internet of …, 2017 - dl.acm.org
Internet of Things (IoT) is an integral part of application domains such as smart-home and
digital healthcare. Various standard public key cryptography techniques (eg, key exchange …