Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges

M Mahamat, G Jaber, A Bouabdallah - Wireless Networks, 2023 - Springer
The advent of the Internet of Things (IoT), with thousands of connected, heterogeneous, and
energy-constrained devices, enables new application domains and improves our everyday …

Analysis of lightweight cryptographic algorithms on iot hardware platform

M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …

[HTML][HTML] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for internet of things environment

U Ali, MYIB Idris, J Frnda, MNB Ayub, MA Khan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a fast-growing technology that enable existing
systems to communicate with one another by using new devices such as sensors and other …

Modified lightweight cryptography scheme and its applications in IoT environment

N Yasmin, R Gupta - International Journal of Information Technology, 2023 - Springer
Interconnected devices have been with us for a long time. The security of the data
exchanged through these devices is a matter of grave concern. While exchanging …

Lesca: Lightweight stream cipher algorithm for emerging systems

H Noura, O Salman, R Couturier, A Chehab - Ad Hoc Networks, 2023 - Elsevier
Recently, there has been a dire need for lightweight cryptographic solutions, which exhibit
low computational complexity and require few resources. In this paper, we present LESCA, a …

RISC-V instruction set extensions for lightweight symmetric cryptography

H Cheng, J Großschädl, B Marshall, D Page… - IACR Transactions on …, 2023 - tches.iacr.org
Abstract The NIST LightWeight Cryptography (LWC) selection process aims to standardise
cryptographic functionality which is suitable for resource-constrained devices. Since the …

Cube attacks on round-reduced TinyJAMBU

WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan - Scientific Reports, 2022 - nature.com
Lightweight cryptography has recently gained importance as the number of Internet of things
(IoT) devices connected to Internet grows. Its main goal is to provide cryptographic …

Formal verification of arithmetic masking in hardware and software

B Gigerl, R Primas, S Mangard - International Conference on Applied …, 2023 - Springer
Masking is a popular countermeasure to protect cryptographic implementations against
physical attacks like differential power analysis. So far, research focused on Boolean …

Security threats and cryptographic protocols for medical wearables

L Hernández-Álvarez, JJ Bullón Pérez, FK Batista… - Mathematics, 2022 - mdpi.com
In the past few years, the use of several medical devices is increasing. This paper will pay
attention to a device developed to get measures of the temperature of diabetic foot. These …