A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key

A Ghani, K Mansoor, S Mehmood… - International Journal …, 2019 - Wiley Online Library
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …

Penetration testing: Concepts, attack methods, and defense strategies

M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …

Task offloading in mobile fog computing by classification and regression tree

D Rahbari, M Nickray - Peer-to-Peer Networking and Applications, 2020 - Springer
Fog computing (FC) as an extension of cloud computing provides a lot of smart devices at
the network edge, which can store and process data near end users. Because FC reduces …

Privacy-preserving three-factor authentication protocol for wireless sensor networks deployed in agricultural field

MN Fatima, MS Obaidat, K Mahmood… - ACM Transactions on …, 2023 - dl.acm.org
The agriculture is the backbone of economic system, and it plays an essential part in the
survival of a nation's prosperity. In addition to providing raw materials and food, it also offers …

[HTML][HTML] Secure authentication for remote patient monitoring with wireless medical sensor networks

T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh… - Sensors, 2016 - mdpi.com
There is broad consensus that remote health monitoring will benefit all stakeholders in the
healthcare system and that it has the potential to save billions of dollars. Among the major …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

[HTML][HTML] Two-phase hybrid cryptography algorithm for wireless sensor networks

R Rizk, Y Alkady - Journal of Electrical Systems and Information …, 2015 - Elsevier
For achieving security in wireless sensor networks (WSNs), cryptography plays an important
role. In this paper, a new security algorithm using combination of both symmetric and …

Anonymous three-factor authenticated key agreement for wireless sensor networks

Y Lu, G Xu, L Li, Y Yang - Wireless Networks, 2019 - Springer
Secure information exchange in wireless sensor networks (WSN) is a continuing issue since
the resource-constrained sensors generally deployed over an unattended environment. To …