Smart cities: A survey on data management, security, and enabling technologies

A Gharaibeh, MA Salahuddin… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Integrating the various embedded devices and systems in our environment enables an
Internet of Things (IoT) for a smart city. The IoT will generate tremendous amount of data that …

DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN

M Revanesh, JM Acken, V Sridhar - Future Generation Computer Systems, 2023 - Elsevier
A wireless sensor network (WSN) is a staple network architecture that can be widely used to
support diverse of applications as smart cities, smart homes, etc. However, energy …

A survey on software implementation of lightweight block ciphers for IoT devices

A Sevin, AAO Mohammed - Journal of Ambient Intelligence and …, 2023 - Springer
Internet of things (IoT) is a computing concept that illustrates how things are connected to the
internet and can communicate with other things. IoT consists of masses of physical devices …

Lightweight modifications in the Advanced Encryption Standard (AES) for IoT applications: a comparative survey

RS Salman, AK Farhan, A Shakir - … International Conference on …, 2022 - ieeexplore.ieee.org
The Internet of Things is a network of billions of interconnected devices that communicate
over the internet. These massive devices exchange massive amounts of data every second …

New framework for authentication and key establishment to secure 6LoWPAN networks

FF Alshrif, EA Sundararajan, R Ahmad… - 2021 International …, 2021 - ieeexplore.ieee.org
This paper describes a design of a lightweight authentication solution for the 6LoWPAN
based Wireless Sensor Network. 6LoWPAN nodes are classified as constrained devices …

A review on fpga implementation of lightweight cryptography for wireless sensor network

B Sreehari, V Sankar, RS Lopez… - 2023 International …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have become increasingly popular in recent years due to
their ability to remotely monitor and gather data in a variety of applications. The frequent …

A novel energy-efficient encryption algorithm for secure data in WSNs

H Hayouni, M Hamdi - The Journal of Supercomputing, 2021 - Springer
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile
and without assistance. A certain level of security must be provided. However, the resource …

Attacks and defenses for single-stage residue number system PRNGs

A Vennos, K George, A Michaels - IoT, 2021 - mdpi.com
This paper explores the security of a single-stage residue number system (RNS)
pseudorandom number generator (PRNG), which has previously been shown to provide …

Resource usage evaluation of the PHOTON hash function

T Mangole, ASJ Helberg, KK Nair - 2022 Conference on …, 2022 - ieeexplore.ieee.org
Advances in ubiquitous computing have led to the use of the Internet of Things (IoT), which
consists of resource-constrained devices. The use of constrained devices raises significant …

FPGA implementation of a lightweight simple encryption scheme to secure IoT using novel key scheduling technique

KK VG - International Journal of Applied Science and …, 2021 - gigvvy.com
Internet of things (IoT), being the technology of this generation and several billions of
electronic devices exchanging a huge secure information. With the low resource devices like …