A review on lightweight cryptography algorithms for data security and authentication in IoTs

I Bhardwaj, A Kumar, M Bansal - 2017 4th International …, 2017 - ieeexplore.ieee.org
Internet of Things (IoTs) comprises of a cluster of resource constrained devices, sensors and
machines connected with each other and communicating over the internet. Due to frequent …

A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

CT-RPL: Cluster tree based routing protocol to maximize the lifetime of Internet of Things

S Sankar, S Ramasubbareddy, AK Luhach, A Nayyar… - Sensors, 2020 - mdpi.com
Energy conservation is one of the most critical challenges in the Internet of Things (IoT). IoT
devices are incredibly resource-constrained and possess miniature power sources, small …

Enabling relay-assisted D2D communication for cellular networks: Algorithm and protocols

T Liu, JCS Lui, X Ma, H Jiang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Recently, there is a growing emphasis on device-to-device (D2D) communication, which is
the key component of the Internet-of-Things ecosystem. D2D communication can operate on …

Efficient VANET safety message delivery and authenticity with privacy preservation

TM Mohamed, IZ Ahmed, RA Sadek - PeerJ Computer Science, 2021 - peerj.com
Vehicular ad-hoc networks (VANETs) play an essential role in the development of the
intelligent transportation system (ITS). VANET supports many types of applications that have …

Security issues of internet of things in health-care sector: An analytical approach

P Pandey, SC Pandey, U Kumar - Advancement of Machine Intelligence in …, 2020 - Springer
Abstract Internet of Things (IoT) has created an impetus to digitalizing numerous processes
in day to day life. It soberly refers to interconnection of computing devices via the Internet …

Secure and reliable Internet of Things systems for healthcare

G Pulkkis, J Karlsson, M Westerlund… - 2017 IEEE 5th …, 2017 - ieeexplore.ieee.org
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are
described. Implications of current European Union legislation, the new General Data …

[PDF][PDF] Security in Wireless Sensor Networks Using Lightweight Cryptography.

H Tawalbeh, S Hashish, L Tawalbeh… - Journal of Information …, 2017 - researchgate.net
Wireless Sensor Networks (WSNs) have multiple uses and applications at the individual and
organizations levels. Sensors are integrated in many fields including health, traffic …

A novel chaining encryption algorithm for LPWAN IoT network

AJ Bidgoly, HJ Bidgoly - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
LPWAN IoT networks (such as Sigfox, LoRaWAN, and NB-IoT) become more applicable
every day in the industry. Despite their unique advantages, these technologies have many …

[PDF][PDF] Lightweight Dynamic Crypto Algorithm for Next Internet Generation.

AH Al-Omari - Engineering, Technology & Applied Science …, 2019 - academia.edu
Modern applications, especially real time applications, are hungry for high-speed end-to-
end transmission which usually conflicts with the necessary requirements of confidential and …