Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

An incentive and reputation mechanism based on blockchain for crowd sensing network

Z Noshad, AU Khan, S Abbas, Z Abubaker… - Journal of …, 2021 - Wiley Online Library
Nowadays, sensors inserted in mobile applications are used for gathering data for an
explicit assignment that can effectively save cost and time in crowd sensing networks …

Novel implementation of audio encryption using pseudorandom byte generator

B Stoyanov, T Ivanova - applied sciences, 2021 - mdpi.com
In this paper, we present an algorithm for encrypting audio files based on the Ikeda map, a
mathematical function of chaos theory. Detailed experimental, security and theoretical …

Start code-based encryption and decryption framework for hevc

MK Lee, ES Jang - IEEE Access, 2020 - ieeexplore.ieee.org
In this article, we propose a new selective encryption and decryption framework based on
the start code for high efficiency video coding. There is a growing need to encrypt video …

[PDF][PDF] Analyzing and securing data using data science and blockchain in smart networks

Z Noshad, N Javaid, M Imran - 2019 - researchgate.net
I Zainib Noshad (Registration No. CIIT/FA17-RSE-038/ISB) hereby declare that I have
produced the work presented in this thesis during the scheduled period of study. I also …

Image steganography using steg with AES and LSB

L Negi, L Negi - 2021 IEEE 7th international conference on …, 2021 - ieeexplore.ieee.org
Nowadays mobile phone becoming one of the most popular communication system.
Information shared through this medium is a very sensitive to the users. Hence it is highly …

Performance investigations on data protection algorithms in generalized multi protocol label switched optical networks

Monika, S Singh, A Wason - Scientific Reports, 2023 - nature.com
In future generation networks, data protection is a crucial necessity particularly when
information is sent on a system. Network protection has three objectives known as …

A blockchain based incentive mechanism for crowd sensing network

Z Noshad, A Javaid, M Zahid, I Ali, RJH Khan… - Advances on P2P …, 2020 - Springer
Abstract Crowd Sensing Network (CSN) uses sensor embedded mobile phones for the
collection of data for some specific task which can effectively save cost and time. The quality …

An innovative model for the enhancement of IoT device using lightweight cryptography

S Thapliyal, H Gupta, SK Khatri - 2019 Amity International …, 2019 - ieeexplore.ieee.org
The problem statement is that at present there is no stable algorithm which provides security
for resource constrained devices because classic cryptography algorithms are too heavy to …

Performance analysis of AES, Blowfish and Rijndael: cryptographic algorithms for audio

C Rathod, A Gonsai - Rising Threats in Expert Applications and Solutions …, 2021 - Springer
Normally people share data like text, image, audio or video with others using a computer
network. When these media are transmitting through the computer network, it faces various …