Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …

An empirical study on system level aspects of Internet of Things (IoT)

SN Swamy, SR Kota - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an integration of the Sensor, Embedded, Computing, and
Communication technologies. The purpose of the IoT is to provide seamless services to …

Hardware security in IoT devices with emphasis on hardware trojans

S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
Security of IoT devices is getting a lot of attention from researchers as they are becoming
prevalent everywhere. However, implementation of hardware security in these devices has …

Security of satellite-terrestrial communications: Challenges and potential solutions

I Ahmad, J Suomalainen, P Porambage, A Gurtov… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …

Maximizing IoT Security: An Examination of Cryptographic Algorithms

L Arya, YK Sharma, R Kumar… - … on Power Energy …, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of
interconnected sensors and devices that generate and exchange vast amounts of data. With …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

Social phenomena and fog computing networks: A novel perspective for future networks

S Tu, M Waqas, SU Rehman, T Mir… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Fog computing is an emerging technology that aims at reducing the load on cloud data
centers by migrating some computation and storage toward end-users. It leverages the …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …