Lightweight cryptography methods

WJ Buchanan, S Li, R Asif - Journal of Cyber Security Technology, 2017 - Taylor & Francis
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …

A review of security in internet of things

Y Harbi, Z Aliouat, S Harous, A Bentaleb… - Wireless Personal …, 2019 - Springer
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …

[HTML][HTML] A novel chaos-based permutation for image encryption

M Alawida - Journal of King Saud University-Computer and …, 2023 - Elsevier
Image encryption is an essential method for ensuring confidentiality during transmission on
open channels. Digital images have a high correlation with large redundant data, requiring …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

[PDF][PDF] Report on lightweight cryptography

K McKay, L Bassham, M Sönmez Turan, N Mouha - 2016 - csrc.nist.gov
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …

SLIM: A lightweight block cipher for internet of health things

B Aboushosha, RA Ramadan, AD Dwivedi… - IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, there is a strong demand for increasing the protection of resource-constrained
devices such as Radio frequency identification (RFID) systems. Current cryptographic …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G

IH Abdulqadder, D Zou, IT Aziz - Future Generation Computer Systems, 2023 - Elsevier
Software-defined networking (SDN) has increased the need for security due to the
participation of illegitimate packets resulting from poor processing times and inadequate …

Recent reinforcement learning and blockchain based security solutions for internet of things: Survey

R Gasmi, S Hammoudi, M Lamri, S Harous - Wireless Personal …, 2023 - Springer
Users' security is one of the most important issues in Internet of Things (IoT) due to the high
number of IoT devices involved in different applications. Security threats are evolving at a …

[HTML][HTML] Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing

B Ali, MA Gregory, S Li, OA Dib - Computer Networks, 2024 - Elsevier
This paper proposes an efficient trust-aware authentication and task offloading scheme for
Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The …