A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …
a fair amount of research for their essential security role in low-resource devices. Our …
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …
various events in the surrounding environment and report back to the base station. Sensor …
Penetration testing: Concepts, attack methods, and defense strategies
M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …
investigate different aspects of penetration testing including tools, attack methodologies, and …
Task offloading in mobile fog computing by classification and regression tree
Fog computing (FC) as an extension of cloud computing provides a lot of smart devices at
the network edge, which can store and process data near end users. Because FC reduces …
the network edge, which can store and process data near end users. Because FC reduces …
Privacy-preserving three-factor authentication protocol for wireless sensor networks deployed in agricultural field
MN Fatima, MS Obaidat, K Mahmood… - ACM Transactions on …, 2023 - dl.acm.org
The agriculture is the backbone of economic system, and it plays an essential part in the
survival of a nation's prosperity. In addition to providing raw materials and food, it also offers …
survival of a nation's prosperity. In addition to providing raw materials and food, it also offers …
[HTML][HTML] Secure authentication for remote patient monitoring with wireless medical sensor networks
There is broad consensus that remote health monitoring will benefit all stakeholders in the
healthcare system and that it has the potential to save billions of dollars. Among the major …
healthcare system and that it has the potential to save billions of dollars. Among the major …
Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …
internet of things and industry 4.0. These autonomous resource-constrained devices share …
[HTML][HTML] Two-phase hybrid cryptography algorithm for wireless sensor networks
For achieving security in wireless sensor networks (WSNs), cryptography plays an important
role. In this paper, a new security algorithm using combination of both symmetric and …
role. In this paper, a new security algorithm using combination of both symmetric and …
Anonymous three-factor authenticated key agreement for wireless sensor networks
Secure information exchange in wireless sensor networks (WSN) is a continuing issue since
the resource-constrained sensors generally deployed over an unattended environment. To …
the resource-constrained sensors generally deployed over an unattended environment. To …