A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices

S Rajesh, V Paul, VG Menon, MR Khosravi - Symmetry, 2019 - mdpi.com
Recent advancements in wireless technology have created an exponential rise in the
number of connected devices leading to the internet of things (IoT) revolution. Large …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security

J Jamaludin, R Romindo - IJISTECH (International Journal of Information …, 2020 - ijistech.org
According to the key used, cryptography can be divided into two, namely: symmetric
cryptography and asymmetric cryptography, each of which has advantages and …

A Novel Blockchain Strategy for Third Party Aware Crosschain Transaction Framework

S Madhuri, V Nagalakshmi - Wireless Personal Communications, 2023 - Springer
In the digital transaction application, the crosschain process has attracted recent
researchers of their significance. However, providing security for the crosschain transaction …

CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management

D Kumbhakar, S Adhikari, S Karforma - Multimedia Tools and Applications, 2024 - Springer
Supply chain management (SCM), an essential part of E-Commerce, is required to plan,
control, and procurement raw materials, manufacturing, and distribution of the right product …

Lightweight payload encryption-based authentication scheme for advanced metering infrastructure sensor networks

N Abosata, S Al-Rubaye, G Inalhan - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) connects billions of sensors to share and collect data at any time
and place. The Advanced Metering Infrastructure (AMI) is one of the most important IoT …

[PDF][PDF] Fast and robust approach for data security in communication channel using pascal matrix

OK Hamid, RB Abduljabbar… - Indonesian Journal of …, 2020 - academia.edu
This paper described fast and robust approach of text encryption and decryption based on
Pascal matrix. The technique of encryption can be applied on both Arabic and English text …

Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications

PS Salankar, V Avasthi… - International Journal of …, 2023 - inderscienceonline.com
The medical data generated from the patients that are communicated and stored on servers
are highly sensitive, and also the IoMT network creates open spaces for an adversary. The …

[PDF][PDF] Magic cube puzzle approach for image encryption

AFO Gaffar, R Malani… - International Journal of …, 2020 - pdfs.semanticscholar.org
Cryptography is the science of data encryption. Encryption is the process of encoding data
(messages, information, etc.) in such a way that the data becomes messy and difficult to …

Combination of rail fence cipher algorithm and least significant bit technique to secure the image file

D Rachmawati, MA Budiman… - IOP Conference Series …, 2020 - iopscience.iop.org
Image is a visual representation of an object The process of sending information, especially
images, can be done anywhere and with any intermediary, but not all information is public …