Performance evaluation of IoT encryption algorithms: memory, timing, and energy

S Maitra, D Richards, A Abdelgawad… - 2019 IEEE sensors …, 2019 - ieeexplore.ieee.org
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …

[HTML][HTML] Rapidly deployable IoT architecture with data security: Implementation and experimental evaluation

S Maitra, K Yelamarthi - Sensors, 2019 - mdpi.com
Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing
and integration of heterogeneous objects connected to the network. The broad nature of its …

Analyzing the resource utilization of AES encryption on IoT devices

PS Munoz, N Tran, B Craig… - 2018 Asia-Pacific …, 2018 - ieeexplore.ieee.org
With the prosperity of the Internet of Things (IoT), the implied security issues demand
heightened attention. However, conventional cryptographic security solutions often lead to …

Low-cost AES-128 implementation for edge devices in IoT applications

S Shanthi Rekha, P Saravanan - Journal of Circuits, Systems and …, 2019 - World Scientific
Internet of Things (IoT) is an ecosystem of connected edge devices that are accessible
through the internet. Recent research focusses on adding more smartness and intelligence …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - arXiv preprint arXiv …, 2017 - arxiv.org
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …

An efficient lightweight cryptographic algorithm for IoT security

M Abdulraheem, JB Awotunde, RG Jimoh… - … on Information and …, 2020 - Springer
To perform various tasks, different devices are interconnected and interact in several
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …

MAES: Modified advanced encryption standard for resource constraint environments

AR Chowdhury, J Mahmud… - 2018 IEEE Sensors …, 2018 - ieeexplore.ieee.org
Internet of things (IoT), internetworking of smart devices, embedded with sensors, software,
electronics and network connectivity that enables to communicate with each other to …

Efficient security algorithm for power-constrained IoT devices

JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques due to their constrained …

[HTML][HTML] Power consumption and calculation requirement analysis of AES for WSN IoT

CW Hung, WT Hsu - Sensors, 2018 - mdpi.com
Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and
security of IoT systems have become very important issues. Advanced Encryption Standard …

End-to-end encryption in resource-constrained IoT device

ASD Alluhaidan, P Prabu - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …