Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
Current status and security trend of osint
YW Hwang, IY Lee, H Kim, H Lee… - … and Mobile Computing, 2022 - Wiley Online Library
Recently, users have used open‐source intelligence (OSINT) to gather and obtain
information regarding the data of interest. The advantage of using data gathered by OSINT is …
information regarding the data of interest. The advantage of using data gathered by OSINT is …
Sok: Oracles from the ground truth to market manipulation
One fundamental limitation of blockchain-based smart contracts is that they execute in a
closed environment. Thus, they only have access to data and functionality that is already on …
closed environment. Thus, they only have access to data and functionality that is already on …
Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications
Lightweight cryptography is a rapidly developing research field. Its main goal is to provide
security for devices with fewer resources. These limited‐resource devices implement …
security for devices with fewer resources. These limited‐resource devices implement …
IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …
the Internet of Things (IoT). This has attracted the attention of new operators as well as …
A modified lightweight PRESENT cipher for IoT security
R Chatterjee, R Chakraborty - 2020 International conference on …, 2020 - ieeexplore.ieee.org
Of late, the massive use of pervasive devices in the electronics field has raised the concerns
about security. In embedded applications or IoT domain implementing a full-fledged …
about security. In embedded applications or IoT domain implementing a full-fledged …
[HTML][HTML] Analysis of the Cryptographic Algorithms in IoT Communications
The advances on recent communication paradigms brings new security and privacy
challenges, mainly about personal data collection by smart devices. Resource constrained …
challenges, mainly about personal data collection by smart devices. Resource constrained …
A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system
Cryptography algorithms play a critical role in information technology against various attacks
witnessed in the digital era. Many studies and algorithms are done to achieve security …
witnessed in the digital era. Many studies and algorithms are done to achieve security …
Lightweight cryptography for IoT: A state-of-the-art
VA Thakor, MA Razzaque, MRA Khandaker - arXiv preprint arXiv …, 2020 - arxiv.org
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for
almost all industries due to its wide range of applications from various domains. The …
almost all industries due to its wide range of applications from various domains. The …
Beamforming galvanic coupling signals for IoMT implant-to-relay communication
Implants are poised to revolutionize personalized healthcare by monitoring and actuating
physiological functions. Such implants operate under challenging constraints of the limited …
physiological functions. Such implants operate under challenging constraints of the limited …