Lightweight cryptography algorithms for internet of things enabled networks: An overview

LM Shamala, G Zayaraz, K Vivekanandan… - Journal of Physics …, 2021 - iopscience.iop.org
Internet of Things is a worldwide set-up of interconnected entities that permits millions of
devices to communicate with each other. Combined with reliable communication, ensuring …

Security threats in IoT: vision, technologies and research challenges

A Raj, S Prakash - … for Computational Intelligence: Proceedings of ICTSCI …, 2022 - Springer
Internet of things is a group of numerous types of objects “things” that are embedded with
sensors, software, and different technologies to communicate and share data with other …

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

P Singh, S Krishnamoorthy, A Nayyar… - International …, 2019 - journals.sagepub.com
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It
is challenging to implement in the real-world scenarios when these anomalies occur …

[HTML][HTML] Lightweight S-box architecture for secure internet of things

A Prathiba, VSK Bhaaskaran - Information, 2018 - mdpi.com
Lightweight cryptographic solutions are required to guarantee the security of Internet of
Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The …

Encryption Algorithms in IoT: Security vs Lifetime

I Kuzminykh, M Yevdokymenko… - Available at SSRN …, 2021 - papers.ssrn.com
IoT devices are inherently limited by their processing capabilities and power capacity. While
aiming to maximize their lifespan, one of the biggest challenges they face is to reduce the …

Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

L Xie, F Hang, W Guo, Z Zhang, H Li - International Journal of …, 2022 - igi-global.com
Abstract Information security theory has its roots in the field of information systems. It is
composed completely of ideas relating to information and the variety of systems on which it …

An efficient IoT based framework for missed call messaging services for electricity consumers

K Sharma, A Malik, Isha - International Conference on Advanced …, 2020 - Springer
This paper is introducing the missed call messaging services to the consumers of the
electricity. Nowadays, there are consumers who could not get their monthly bills in the form …

Honey bee optimization based sink mobility aware heterogeneous protocol for wireless sensor network

AK Luhach, A Khamparia, R Sihag, R Kumar - … Computing: Practice and …, 2019 - scpe.org
Abstract Wireless Sensor Network (WSN) has emerged as one of the most important
technologies serving an array of solutions for critical applications such as defense, industrial …

An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT

O Khomlyak - 2017 - diva-portal.org
Data security play a central role in the design of Internet of Things (IoT). Since most of the"
things" in IoT are an embedded computing devices it is appropriate to talk about …

[HTML][HTML] Информационная безопасность в системе" Интернет вещей"

АГ Коробейников, АЮ Гришенцев… - Вестник Чувашского …, 2018 - cyberleninka.ru
Прогнозируется, что к 2020 г. число устройств, интегрированных в среду «Интернет
вещей», превысит один миллиард. Наряду с интенсивным распространением по всему …