A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2017 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key

A Ghani, K Mansoor, S Mehmood… - International Journal …, 2019 - Wiley Online Library
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …

Penetration testing: Concepts, attack methods, and defense strategies

M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …

Task offloading in mobile fog computing by classification and regression tree

D Rahbari, M Nickray - Peer-to-Peer Networking and Applications, 2020 - Springer
Fog computing (FC) as an extension of cloud computing provides a lot of smart devices at
the network edge, which can store and process data near end users. Because FC reduces …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

[HTML][HTML] Secure authentication for remote patient monitoring with wireless medical sensor networks

T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh… - Sensors, 2016 - mdpi.com
There is broad consensus that remote health monitoring will benefit all stakeholders in the
healthcare system and that it has the potential to save billions of dollars. Among the major …

[HTML][HTML] Two-phase hybrid cryptography algorithm for wireless sensor networks

R Rizk, Y Alkady - Journal of Electrical Systems and Information …, 2015 - Elsevier
For achieving security in wireless sensor networks (WSNs), cryptography plays an important
role. In this paper, a new security algorithm using combination of both symmetric and …

A lightweight and secure three-factor authentication protocol with adaptive privacy-preserving property for wireless sensor networks

Y Li, Y Tian - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
In recent years, wireless sensor networks (WSNs) have been extensively used in many
fields, which provide great convenience for people's daily work and life. With the popularity …

An investigation of Bluetooth security vulnerabilities

P Cope, J Campbell, T Hayajneh - 2017 IEEE 7th annual …, 2017 - ieeexplore.ieee.org
As Bluetooth technology has evolved and improved over the years, it has gained
widespread acceptance and is increasingly found in many aspects of everyday life. It's …