SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Computer Networks, 2021 - Elsevier
Abstract As the Intenert of Things (IoT) continues to evolve in our daily personal lives and in
future industrial systems (industry 4.0), one of the most significant issues is security. IoT …

[HTML][HTML] Analysis of lightweight cryptographic algorithms on iot hardware platform

M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …

[HTML][HTML] Neural network for low-memory IoT devices and MNIST image recognition using kernels based on logistic map

A Velichko - Electronics, 2020 - mdpi.com
This study presents a neural network which uses filters based on logistic mapping
(LogNNet). LogNNet has a feedforward network structure, but possesses the properties of …

Lightweight cryptography algorithms for internet of things enabled networks: An overview

LM Shamala, G Zayaraz, K Vivekanandan… - Journal of Physics …, 2021 - iopscience.iop.org
Internet of Things is a worldwide set-up of interconnected entities that permits millions of
devices to communicate with each other. Combined with reliable communication, ensuring …

Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome IoT architecture

V Simadiputra, N Surantha - Bulletin of Electrical Engineering and …, 2021 - beei.org
Abstract Internet-of-Things or IoT technology becomes essential in everyday lives. The risk
of security and privacy towards IoT devices, especially smarthomes IoT gateway device …

Model-based, fully simulated, system-level power consumption estimation of IoT devices

Ö Özkaya, B Örs - Microprocessors and Microsystems, 2024 - Elsevier
Internet of things (IoT) gaining more importance due to its crucial role in pervasive
computing and also Industry 4.0. Since the number of IoT devices is scaling up to multiple …

Securing networks of iot devices with digital twins and automated adversary emulation

EW van der Wal, M El-Hajj - 2022 26th International Computer …, 2022 - ieeexplore.ieee.org
With the number of Internet-connected devices (things), expected to be almost 30 billion by
2030, the Internet of Things (IoT) technologies already became a part of everyday life …

Proposing encryption selection model for IoT devices based on IoT device design

M Saleh, NZ Jhanjhi, A Abdullah… - 2022 24th International …, 2022 - ieeexplore.ieee.org
The shortage of resources and services coincides with the expansion of urbanization.
Modern technology utilization has become necessary to compensate for this shortage and to …

An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices

KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …