[HTML][HTML] A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices

S Rajesh, V Paul, VG Menon, MR Khosravi - Symmetry, 2019 - mdpi.com
Recent advancements in wireless technology have created an exponential rise in the
number of connected devices leading to the internet of things (IoT) revolution. Large …

An efficient framework for privacy-preserving computations on encrypted IoT data

S Ramesh, M Govindarasu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
There are two fundamental expectations from cloud-IoT applications using sensitive and
personal data: 1) utility and 2) privacy. Due to the complex nature of cloud-IoT ecosystems …

Physical layer security for IoT devices configuration and key management-a proof of concept

L Brilli, T Pecorella, L Mucchi - 2016 AEIT International Annual …, 2016 - ieeexplore.ieee.org
The IoT paradigm is continuously growing, but the security is not taken into account as it
should. The standards allows the use of cryptographic suites at various layer (network, IP …

On track of sigfox confidentiality with end-to-end encryption

R Fujdiak, P Blazek, K Mikhaylov, L Malina… - Proceedings of the 13th …, 2018 - dl.acm.org
The last years brought many novel challenges for the Internet of Things (IoT). Low capital
and operational expenditures, massive deployments of devices, reliability and security are …

Using smartphones to enable low-cost secure consumer IoT devices

R McPherson, J Irvine - IEEE Access, 2020 - ieeexplore.ieee.org
This paper proposes a solution for low-cost consumer IoT devices to employ end-to-end
security without requiring additional hardware. Manufacturers of consumer IoT devices often …

CEaaS: Constrained encryption as a service in fog-enabled IoT

PK Deb, A Mukherjee, S Misra - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In this work, we present a solution toward facilitating dynamic encryption schemes—
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …

A context-aware encryption protocol suite for edge computing-based IoT devices

Z Dar, A Ahmad, FA Khan, F Zeshan, R Iqbal… - The Journal of …, 2020 - Springer
Heterogeneous devices are connected with each other through wireless links within a cyber
physical system. These devices undergo resource constraints such as battery, bandwidth …

[HTML][HTML] Efficient adaptive framework for securing the Internet of Things devices

U Farooq, N Ul Hasan, I Baig, N Shehzad - EURASIP Journal on Wireless …, 2019 - Springer
The research on the Internet of Things (IoT) has made huge strides forward in the past
couple of years. IoT has its applications in almost every walk of life, and it is being regarded …

Lightweight dynamic key-dependent and flexible cipher scheme for IoT devices

H Noura, A Chehab, R Couturier - 2019 IEEE Wireless …, 2019 - ieeexplore.ieee.org
Security attacks against Internet of Things (IoT) are on the rise and they lead to drastic
consequences. Data confidentiality is typically based on a strong symmetric-key algorithm to …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …