Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

Lightweight cryptography: a solution to secure IoT

SS Dhanda, B Singh, P Jindal - Wireless Personal Communications, 2020 - Springer
Abstract In Internet of Things (IoT), the massive connectivity of devices and enormous data
on the air have made information susceptible to different type of attacks. Cryptographic …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

A rigid-flex wearable health monitoring sensor patch for IoT-connected healthcare applications

T Wu, F Wu, C Qiu, JM Redouté… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a new communication paradigm that can connect elements
from various fields through the Internet. One of the most attractive IoT applications is in the …

Secured data collection with hardware-based ciphers for IoT-based healthcare

H Tao, MZA Bhuiyan, AN Abdalla… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
There are tremendous security concerns with patient health monitoring sensors in Internet of
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …

A survey on internet of things security from data perspectives

J Hou, L Qu, W Shi - Computer Networks, 2019 - Elsevier
Abstract As the Internet of Things (IoT) sees an increasing use in the society, the security
challenge it faces is becoming more and more severe. Data collected and shared in the IoT …

[HTML][HTML] Hardware security in IoT devices with emphasis on hardware trojans

S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
Security of IoT devices is getting a lot of attention from researchers as they are becoming
prevalent everywhere. However, implementation of hardware security in these devices has …

Penetration testing: Concepts, attack methods, and defense strategies

M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …