To see the other types of publications on this topic, follow the link: Lightweight Encryption Algorithm.

Journal articles on the topic 'Lightweight Encryption Algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Lightweight Encryption Algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nyssanbayeva, Saule, Nursulu Kapalova, Armiyanbek Haumen, and Olzhas Suleimenov. "The LBC-3 lightweight encryption algorithm." Open Engineering 12, no. 1 (2022): 570–77. http://dx.doi.org/10.1515/eng-2022-0372.

Full text
Abstract:
Abstract This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The process of generating the round keys of the algorithm is also considered. The results of the study of the cryptographic properties of the algorithm using the “avalanche effect” and statistical tests are presented. The avalanche property was
APA, Harvard, Vancouver, ISO, and other styles
2

Abdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.

Full text
Abstract:
Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This
APA, Harvard, Vancouver, ISO, and other styles
3

Dunmore, Aeryn, Juliet Samandari, and Julian Jang-Jaccard. "Matrix Encryption Walks for Lightweight Cryptography." Cryptography 7, no. 3 (2023): 41. http://dx.doi.org/10.3390/cryptography7030041.

Full text
Abstract:
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simp
APA, Harvard, Vancouver, ISO, and other styles
4

Cherckesova, Larissa, Olga Safaryan, Pavel Razumov, Dmitry Medvedev, Veronica Kravchenko, and Yuriy Ivanov. "Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities." E3S Web of Conferences 224 (2020): 01043. http://dx.doi.org/10.1051/e3sconf/202022401043.

Full text
Abstract:
This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security Agency in 2013 – SPECK. Their detailed description is given, the analysis is made. The task of the study is to investigate and analyze cryptographic encryption algorithms used in devices with limited capabilities such as microcontrollers. The study of lightweight encryption algorithms and their application for cybersecurity tasks is necessary to create the latest cryptographic systems aimed at preventing various types of attacks. The study r
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xing, Jian Chen, Tianning Li, Gang Dai, and Changda Wang. "LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages." Symmetry 15, no. 1 (2023): 177. http://dx.doi.org/10.3390/sym15010177.

Full text
Abstract:
The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It is important to ensure data transmission security on embedded devices with limited computing power and storage space. However, the traditional block encryption algorithm cannot run efficiently on embedded devices because of the large amount of computation. In this paper, a lightweight length-preserving-encryption algorithm (LILP) is proposed to convert an n-bit block cipher into a special block cipher that supports an arbitrary length of no less than 2n bits as input. LILP adopts the involution
APA, Harvard, Vancouver, ISO, and other styles
6

Kapalova, Nursulu, Kunbolat Algazy, and Armanbek Haumen. "Development of a new lightweight encryption algorithm." Eastern-European Journal of Enterprise Technologies 3, no. 9 (123) (2023): 6–19. http://dx.doi.org/10.15587/1729-4061.2023.280055.

Full text
Abstract:
Lightweight encryption algorithms are considered a relatively new direction in the development of private key cryptography. This need arose as a result of the emergence of a large number of devices with little computing power and memory. Therefore, it became necessary to develop algorithms that can provide a sufficient level of security, with minimal use of resources. The paper presents a new lightweight LBC encryption algorithm. LBC is a 64–bit symmetric block algorithm. It supports 80 bit secret key. The number of rounds is 20. The algorithm has a Feistel network structure. The developed lig
APA, Harvard, Vancouver, ISO, and other styles
7

Bahrami, Saeed, and Majid Naderi. "Image Encryption Using a Lightweight Stream Encryption Algorithm." Advances in Multimedia 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/767364.

Full text
Abstract:
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 a
APA, Harvard, Vancouver, ISO, and other styles
8

Fadhil, Heba Mohammed, Mohamed Elhoseny, and Baydaa M. Mushgil. "Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm." Journal of Cybersecurity and Information Management 12, no. 1 (2023): 50–66. http://dx.doi.org/10.54216/jcim.120105.

Full text
Abstract:
The secure transmission of medical data is crucial for the protection of patients' privacy and confidentiality. With the advent of IoT in healthcare, medical data is being transmitted over networks that are vulnerable to cyberattacks. Therefore, there is an urgent need for lightweight yet secure encryption algorithms that can protect medical data in transit. In this paper, we propose an integrated Chaotic-GIFT algorithm for lightweight and robust encryption of medical data transmitted over IoT networks. The proposed algorithm combines the chaos theory with a lightweight block cipher to provide
APA, Harvard, Vancouver, ISO, and other styles
9

Tong, Xiaojun, Xudong Liu, Jing Liu, Miao Zhang, and Zhu Wang. "A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box." International Journal of Bifurcation and Chaos 31, no. 10 (2021): 2150152. http://dx.doi.org/10.1142/s0218127421501522.

Full text
Abstract:
Due to high computational cost, traditional encryption algorithms are not suitable for the environments in which resources are limited. In view of the above problem, we first propose a combined chaotic map to increase the chaotic interval and Lyapunov exponent of the existing one-dimensional chaotic maps. Then, an S-box based on the proposed combined chaotic map is constructed. The performances of the designed S-box, such as bijection, nonlinearity, strict avalanche criteria, differential uniformity, the bits independence criterion, and the linear approximation probability, are tested to show
APA, Harvard, Vancouver, ISO, and other styles
10

Abdalrazzaq, Alaa, and Salah Alabady. "Design and Implementation of a Lightweight and Fast Tiny Advanced Encryption Standard Algorithm." Jordan Journal of Electrical Engineering 8, no. 4 (2022): 339. http://dx.doi.org/10.5455/jjee.204-1658696772.

Full text
Abstract:
Cryptographic algorithms are gaining importance due to their relevance and importance in the areas of privacy and security experienced by the Internet of Things (IoT) devices. They improve data privacy and confidentiality by limiting who can decrypt the data to the person who has the key. Advanced encryption standard (AES) is one of the most important encryption algorithms in use. This algorithm uses 10 rounds for each encryption and decryption process and encrypts data starting with 16 bytes, which increases the time needed for encryption and decryption. In order to speed up encryption and de
APA, Harvard, Vancouver, ISO, and other styles
11

Yun, Junhyeok, and Mihui Kim. "JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things." Sensors 20, no. 13 (2020): 3627. http://dx.doi.org/10.3390/s20133627.

Full text
Abstract:
Along with the recent growth of Internet of Things (IoT) security camera market, there have been a number of personal information leakage incidents from security attacks targeting such cameras. Therefore, a permutation-based video encryption algorithm was proposed to secure video streams in low-performance processors such as IoT security cameras. However, existing permutation-based video encryption algorithms are vulnerable to known-plaintext attacks since they use the same permutation list for every frame. Moreover, situation deduction based on the color composition is possible. In this paper
APA, Harvard, Vancouver, ISO, and other styles
12

Ferdush, Jannatul, Mahbuba Begum, and Mohammad Shorif Uddin. "Chaotic Lightweight Cryptosystem for Image Encryption." Advances in Multimedia 2021 (May 22, 2021): 1–16. http://dx.doi.org/10.1155/2021/5527295.

Full text
Abstract:
Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multimedia element as they are stored on the web servers and transmitted over the networks. Therefore, multimedia data encryption is essential. But, the multimedia encryption algorithm is complex to implement as it requires more time and memory space. For this reason, the lightweight image encryption algorithm gains popularity that requires less memory and less time
APA, Harvard, Vancouver, ISO, and other styles
13

Peng, Chunyan, Xiujuan Du, Keqin Li, and Meiju Li. "An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks." Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/8763528.

Full text
Abstract:
We tackle a fundamental security problem in underwater acoustic networks (UANs). The S-box in the existing block encryption algorithm is more energy consuming and unsuitable for resources-constrained UANs. In this paper, instead of S-box, we present a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increase the key space by changing the number of iteration round. We further propose secure network architecture of UANs. By analysis, our algorithm can resist brute-force searches and adversarial attacks. Simulation results show that, compare
APA, Harvard, Vancouver, ISO, and other styles
14

A. Baker, Shatha, and Ahmed S. Nori. "Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm." NTU Journal of Pure Sciences 1, no. 2 (2022): 10–21. http://dx.doi.org/10.56286/ntujps.v1i2.185.

Full text
Abstract:
In recent years, different encryption lightweight algorithms have been suggested to protect the security of data transferred across the IoT network. The symmetric key ciphers play a significant role in the security of devices, in particular block ciphers. the RECTANGLE algorithm amongst the current lightweight algorithms. Rectangle algorithm does have good encryption efficacy but the characteristics of confusion and diffusion that a cipher needed are lacking from this algorithm. Therefore, by improving the algorithm confusion and diffusion properties, we expanded Rectangle utilizing a 3D ciphe
APA, Harvard, Vancouver, ISO, and other styles
15

VULPE, Alexandru, Raluca ANDREI, Alexandru BRUMARU, and Octavian FRATU. "LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM IMPLEMENTATION IN A MICROCONTROLLER SYSTEM." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 260–64. http://dx.doi.org/10.53477/2668-2028-21-33.

Full text
Abstract:
Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in netw
APA, Harvard, Vancouver, ISO, and other styles
16

Imad Mhaibes, Hakeem, May Hattim Abood, and Alaa Farhan. "Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 20 (2022): 98–113. http://dx.doi.org/10.3991/ijim.v16i20.34505.

Full text
Abstract:
The internet of things (IoT) revolution has been sparked by the exponential increase in connected devices caused by recent advances in wireless technology. These embedded devices gather, analyze, and send vast data via the network. Data transmission security is a primary problem in IoT networks. Several lightweight encryption/decryption algorithms have been developed for such resource-constraint devices. One of most effective and fast lightweight encryption algorithms for IoT applications is the Tiny Encryption Algorithm (TEA). TEA has few lines source of codes to implement and based on Feiste
APA, Harvard, Vancouver, ISO, and other styles
17

Rajesh, Sreeja, Varghese Paul, Varun Menon, and Mohammad Khosravi. "A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices." Symmetry 11, no. 2 (2019): 293. http://dx.doi.org/10.3390/sym11020293.

Full text
Abstract:
Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the network by these embedded devices. Security of the transmitted data is a major area of concern in IoT networks. Numerous encryption algorithms have been proposed in these years to ensure security of transmitted data through the IoT network. Tiny encryption algorithm (TEA) is the most attractive among all, with its lower memory utilization and ease of implementa
APA, Harvard, Vancouver, ISO, and other styles
18

Samir, Nagham, Abdelrahman Sobeih Hussein, Mohaned Khaled, et al. "ASIC and FPGA Comparative Study for IoT Lightweight Hardware Security Algorithms." Journal of Circuits, Systems and Computers 28, no. 12 (2019): 1930009. http://dx.doi.org/10.1142/s0218126619300095.

Full text
Abstract:
Data security, privacy and authenticity are crucial in wireless data transmission. Low power consumption is the main requirement for any chip design targeting the Internet of Things (IoT) applications. In this research paper, a comparative study of eight authenticated encryption and decryption algorithms, selected from the “Competition for Authenticated Encryption: Security, Applicability and Robustness” (CAESAR), namely, ACORN, ASCON, CLOC, JOLTIK, MORUS, PRIMATEs, SCREAM and SILC, is presented. The FPGA and ASIC implementations of these eight algorithms are synthesized, placed and routed. Po
APA, Harvard, Vancouver, ISO, and other styles
19

Jeon, Il-Soo, Myung-Sik Kim, and Eun-Jun Yoon. "A lightweight authenticated encryption algorithm for RFID systems." Applied Mathematical Sciences 8 (2014): 6257–66. http://dx.doi.org/10.12988/ams.2014.48665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Taresh, Hiba. "LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT." Iraqi Journal for Computers and Informatics 44, no. 1 (2018): 1–5. http://dx.doi.org/10.25195/ijci.v44i1.64.

Full text
Abstract:
In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit
APA, Harvard, Vancouver, ISO, and other styles
21

Al-Mejibli, Intisar, and Sura F. Ismail. "Innovative lightweight encryption algorithm for real-time video." Journal of Intelligent & Fuzzy Systems 36, no. 3 (2019): 2817–27. http://dx.doi.org/10.3233/jifs-171966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Abd Ulkadhim, Ahmed Abd Ali. "Chaos-Modified Lightweight Present Algorithm for Image Encryption." International Journal of Engineering Research and Advanced Technology 06, no. 02 (2020): 26–30. http://dx.doi.org/10.31695/ijerat.2020.3601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Vennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.

Full text
Abstract:
Lightweight cryptography is a new concept for securing data more effectively while using fewer resources and providing greater throughput, conservatism, and low battery consumption. Every fraction second, the Internet of Things (IoT), which connects billions of objects, generates massive amounts of data. As the number of devices grows, so does the amount of data generated, and the security of that data becomes a concern. In IoT architecture, gadgets are essentially smaller and low-powered. Because of their complexity, traditional encryption methods are computationally expensive and take many r
APA, Harvard, Vancouver, ISO, and other styles
24

Qaid, Gamil R. S., and Nadhem Sultan Ebrahim. "A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices." Security and Communication Networks 2023 (May 8, 2023): 1–12. http://dx.doi.org/10.1155/2023/9967129.

Full text
Abstract:
Internet of Things (IoT) applications are used in almost every part of our life, so it is important to protect the sensitive data and information that is transmitted over wireless networks such as images and documents. The IoT devices have limited computational resources; they are called limited devices due to their limited processors and memory size. Traditional encryption methods require a lot of computing power; therefore, it is difficult to implement traditional cryptographic algorithm on IoT processor. Finally, a new, lightweight encryption method based on the DNA sequence is proposed to
APA, Harvard, Vancouver, ISO, and other styles
25

Hasan, Mohammad Kamrul, Muhammad Shafiq, Shayla Islam, et al. "Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications." Complexity 2021 (April 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/5540296.

Full text
Abstract:
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and control their behavior accordingly. As evident, these
APA, Harvard, Vancouver, ISO, and other styles
26

Kanda, Guard, and Kwangki Ryoo. "Vedic Multiplier-based International Data Encryption Algorithm Crypto-Core for Efficient Hardware Multiphase Encryption Design." Webology 19, no. 1 (2022): 4581–96. http://dx.doi.org/10.14704/web/v19i1/web19304.

Full text
Abstract:
At present, there are several pieces of research on designing and implementing new cryptographic algorithms that are lightweight and resistant to several, if not major forms of security attacks. However, some algorithms such as the International Data Encryption Algorithm (IDEA), which has been around for some time is yet to record any real threat against its functionality. To ensure its continued usage, current implementations rely on multiphase encryption where it is combined with other algorithms such as ROTation (ROT) and Data Encryption Standard (DES) for maximum security strength. Multiph
APA, Harvard, Vancouver, ISO, and other styles
27

Alghamdi, Yousef, Arslan Munir, and Jawad Ahmad. "A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution." Entropy 24, no. 10 (2022): 1344. http://dx.doi.org/10.3390/e24101344.

Full text
Abstract:
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromise on the security of the encryption to achieve faster encryption. This paper proposes a lightweight, secure, and efficient image encryption algorithm based on logistic map, permutations, and AES S-box. In the proposed algorithm, SHA-2 based on the plaintext image, a pre-shared key, and an initialization vector (IV) are used to generate the initial parameters for the logistic map. The logistic map chaotically generate
APA, Harvard, Vancouver, ISO, and other styles
28

Muhammad, Nurhidayah, and Jasni Mohamad Zain. "CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES." MALAYSIAN JOURNAL OF COMPUTING 4, no. 1 (2019): 237. http://dx.doi.org/10.24191/mjoc.v4i1.6107.

Full text
Abstract:
The purpose of this paper is to propose a conceptual model for data security in the Internet of thing devices. Estimated by Jumoki in early 2018 to 2022, there will be about 18 billion connected IoT devices. Therefore many issue related to IoT devices were discussed especially data security. Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices. Lightweight cryptography scheme has been discussed and proposed widely recently. There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under conside
APA, Harvard, Vancouver, ISO, and other styles
29

Al-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation." Engineering, Technology & Applied Science Research 9, no. 3 (2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.

Full text
Abstract:
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this al
APA, Harvard, Vancouver, ISO, and other styles
30

Fang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.

Full text
Abstract:
Improving the efficiency of RFID data storage and ensuring communication security is an effective way to improve the efficiency and safety of the identifying and authenticating process between charging stations and electric vehicles. Considering structure of electric vehicle charging station (EVCS) and the components of RFID system, this paper presents a charging station security authentication system model based on lightweight RFID security protocol using hybrid encryption technology. This protocol participates in the computation and storage through a reader-writer, so that it can store more
APA, Harvard, Vancouver, ISO, and other styles
31

Ghorashi, Seyed, Tanveer Zia, Yinhao Jiang, and Michael Bewong. "Software Optimisation of Lightweight Klein Encryption in the Internet of Things." Journal of Information Security and Cybercrimes Research 4, no. 2 (2021): 159–72. http://dx.doi.org/10.26735/pxae9280.

Full text
Abstract:
The Internet of Things (IoT) and Wireless Sensor Network (WSN) devices are prone to security vulnerabilities, especially when they are resource constrained. Lightweight cryptography is a promising encryption concept for IoT and WSN devices, that can mitigate these vulnerabilities. For example, Klein encryption is a lightweight block cipher, which has achieved popularity for the trade-off between performance and security. In this paper, we propose one novel method to enhance the efficiency of the Klein block cipher and the effects on the Central Processing Unit (CPU), memory usage, and processi
APA, Harvard, Vancouver, ISO, and other styles
32

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (2018): 223. http://dx.doi.org/10.14419/ijet.v7i4.11.20811.

Full text
Abstract:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when
APA, Harvard, Vancouver, ISO, and other styles
33

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (2018): 262. http://dx.doi.org/10.14419/ijet.v7i4.11.21389.

Full text
Abstract:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when
APA, Harvard, Vancouver, ISO, and other styles
34

Maolood, Abeer Tariq, Ekhlas Khalaf Gbashi, and Eman Shakir Mahmood. "Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 4988. http://dx.doi.org/10.11591/ijece.v12i5.pp4988-5000.

Full text
Abstract:
<span lang="EN-US">In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream ciph
APA, Harvard, Vancouver, ISO, and other styles
35

Muhalhal, Lamia A., and Imad S. Alshawi. "A hybrid modified lightweight algorithm for achieving data integrity and confidentiality." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 833. http://dx.doi.org/10.11591/ijece.v13i1.pp833-841.

Full text
Abstract:
<span lang="EN-US">Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any weaknesses in these two algorithms and create a new lightweight hybrid algorithm called Speck-Salsa20 algorithm for data integrity and confidentiality (SSDIC). SSDIC uses less energy and has an efficient throughput. It works well in both hardware and software and can handle a variety of explicit plaintext and key sizes. SSDIC solves the difficulties of the Speck algorithm. The sequence gen
APA, Harvard, Vancouver, ISO, and other styles
36

Park, Gi-Tae, Hyo-Joon Han, and Jae-Hwoon Lee. "Design and Implementation of Lightweight Encryption Algorithm on OpenSSL." Journal of Korean Institute of Communications and Information Sciences 39B, no. 12 (2014): 822–30. http://dx.doi.org/10.7840/kics.2014.39b.12.822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Khompysh, A., N. A. Kapalova, and O. A. Lizunov. "CONDUCTING STATISTICAL ANALYSIS ON THE LIGHTWEIGHT ENCRYPTION ALGORITHM ISL_LWS." Вестник Алматинского университета энергетики и связи, no. 1 (2023): 150–62. http://dx.doi.org/10.51775/2790-0886_2023_60_1_150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gupta, Nishant, and Ankit Kumar Jain. "RSA Based Consensus Algorithm for Lightweight Private Blockchain Network." ITM Web of Conferences 54 (2023): 03003. http://dx.doi.org/10.1051/itmconf/20235403003.

Full text
Abstract:
Consensus algorithms are essential for achieving agreement among nodes in blockchain systems. However, traditional consensus algorithms such as Proof of Work (PoW) and Proof of Stake (PoS) can be resource-intensive and unsuitable for lightweight private blockchain applications. This paper proposes using the RSA (Rivest–Shamir–Adleman) encryption algorithm as a consensus algorithm for a lightweight private blockchain in the context of a college placement system. RSA offers several advantages over traditional consensus algorithms, including simplicity, efficiency, and security. Moreover, RSA can
APA, Harvard, Vancouver, ISO, and other styles
39

Ayachi, Riadh, Ayoub Mhaouch, and Abdessalem Ben Abdelali. "Lightweight Cryptography for Network-on-Chip Data Encryption." Security and Communication Networks 2021 (May 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/9943713.

Full text
Abstract:
System-on-chip (SoC) is the main processor for most recent applications such as the Internet of things (IoT). SoCs are composed of multiple blocks that communicate with each other through an integrated router. Data routing from a block to another poses many challenges. The network-on-chip (NoC) was used for the transmission of data from a source to a destination with high reliability, high speed, low power consumption, and low hardware occupation. An NoC is composed of a router, network links (NL), and network interface (NI). The main component of the NoC, the NI, is composed of an input/outpu
APA, Harvard, Vancouver, ISO, and other styles
40

M. Abd Zaid, Mustafa, and Dr Soukaena Hassan. "Lightweight Rsa Algorithm Using Three Prime Numbers." International Journal of Engineering & Technology 7, no. 4.36 (2018): 293. http://dx.doi.org/10.14419/ijet.v7i4.36.23790.

Full text
Abstract:
The computing devices utilized as a part of an extensive class of remote correspondence systems, for example, cell phones, remote sensor systems (WSNs), vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), Internet of Things (IoT), body area networks (BANs) and so on, are little and asset compelled. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existed algorithms are modified in terms of resource constraint environments.
APA, Harvard, Vancouver, ISO, and other styles
41

Pandey, Rajeev. "Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network." Journal of Cybersecurity and Information Management 10, no. 2 (2023): 47–56. http://dx.doi.org/10.54216/jcim.100205.

Full text
Abstract:
Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional w
APA, Harvard, Vancouver, ISO, and other styles
42

Jin, Jungha, Yewon Oh, and Keecheon Kim. "A Lightweight Block Cipher Algorithm for Secure SDN Environment." International Journal of Advanced Research in Engineering 4, no. 4 (2018): 1. http://dx.doi.org/10.24178/ijare.2018.4.4.01.

Full text
Abstract:
Software Defined Network is a next-generation networking technology that transforms a closed network environment based on existing network vendors into a flexible, software-based, centralized management environment that can be simplified by abstracting and programming. Although these advantages can be applied to some security problems rather than existing networks, most of the security problems and vulnerabilities of existing networks are present and various attacks are taking place. In this paper, we propose a structure to enhance the security function of SDN by checking how to implement the
APA, Harvard, Vancouver, ISO, and other styles
43

Salankar, Pritam, Vinay Avasthi, and Ashutosh Pasricha. "Analysis and Validation of Lightweight Authentication Algorithm." Ingénierie des systèmes d information 27, no. 4 (2022): 637–43. http://dx.doi.org/10.18280/isi.270414.

Full text
Abstract:
The Constrained Application Protocol (CoAP) is extensively used in several industrial Internet of Things (IoT) applications. Using heavy-weight algorithms is not feasible in resource-constrained IoT environments, and lightweight solutions are vulnerable to security attacks. The trade-off between computing cost and security strength plays a significant role in deciding the right solution. Therefore, developing a lightweight security mechanism with a higher security level is paramount. Therefore, a lightweight authentication with Two-way Encryption for Secure Transmission in CoAP Protocol (LATES
APA, Harvard, Vancouver, ISO, and other styles
44

Babulal, Choudhary Leeladevi, and Anand Sharma. "AL-TEA: Alternative Tea Algorithm for Healthcare Image in IoT." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 6 (2022): 24–30. http://dx.doi.org/10.17762/ijritcc.v10i6.5620.

Full text
Abstract:
Millions of devices are predicted to be connected via the Internet of Things (IoT), which is a promising technology for the future. In numerous industries, interest in leveraging the Internet of Things is predicted to expand. Various IoT applications in the healthcare industry are being studied, and the potential for IoT to improve healthcare will be huge. The rise in communications is likely to result in mountains of data, posing a danger to data security. The architecture's gadgets are substantially smaller and less powerful. Due to their complexity, traditional encryption algorithms are com
APA, Harvard, Vancouver, ISO, and other styles
45

Prathiba, A., Suyash Vardhan Srivathshav, Ramkumar P. E., Rajkamal E., and Kanchana Bhaaskaran V. S. "Lightweight VLSI Architectures for Image Encryption Applications." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–23. http://dx.doi.org/10.4018/ijisp.291700.

Full text
Abstract:
Lightweight cryptography offers significant security service in constrained environments such as wireless sensor networks and Internet of Things. The focus of this article is to construct lightweight SPN block cipher architectures with substitution box based on finite fields. The paper also details the FPGA implementation of the lightweight symmetric block cipher algorithm of SPN type with combinational S-box. Restructuring of traditional look-up-table Substitution Box (S-Box) sub-structure with a combinational logic S-box is attempted. Elementary architectures namely the basic round architect
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, Sung-Won, and Kwee-Bo Sim. "Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security." Electronics 10, no. 9 (2021): 1127. http://dx.doi.org/10.3390/electronics10091127.

Full text
Abstract:
Recently, to enhance the security of the Internet of Things (IoT), research on blockchain-based encryption algorithms has been actively conducted. However, because blockchains have complex structures and process large amounts of data, there are still many difficulties in using the conventional blockchain-based encryption algorithms in an IoT system that must have low power consumption and be ultra-lightweight. In this study, to address these problems (1) we simplified the conventional Directed Acyclic Graph (DAG)-based blockchain structure, and (2) we proposed a new Advanced Encryption Standar
APA, Harvard, Vancouver, ISO, and other styles
47

Jerusha, D., and T. Jaya. "Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing." Computer Systems Science and Engineering 42, no. 3 (2022): 1121–32. http://dx.doi.org/10.32604/csse.2022.022997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lee, Donggeon, Dong-Chan Kim, Daesung Kwon, and Howon Kim. "Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA." Sensors 14, no. 1 (2014): 975–94. http://dx.doi.org/10.3390/s140100975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Singh, Pulkit, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, and Rahul Kumar Chaurasiya. "Efficient hardware architectures of Lilliput lightweight algorithm for image encryption." International Journal of Ad Hoc and Ubiquitous Computing 41, no. 4 (2022): 205. http://dx.doi.org/10.1504/ijahuc.2022.126779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Feng, YeJi, XiaoDong Liu, Shuai Jing, et al. "Optimization and Design of Key Expansion of SM4 Algorithm Based on ZYNQ." Journal of Physics: Conference Series 2296, no. 1 (2022): 012014. http://dx.doi.org/10.1088/1742-6596/2296/1/012014.

Full text
Abstract:
Abstract As the application of "China Intelligent Manufacturing" in the field of production becomes more and more extensive, it becomes crucial to ensure the security of information interaction between production equipment. China's domestic encryption algorithm - SM4 block encryption algorithm came into being. The algorithm consists of a key expansion function and an encryption and decryption function. The key expansion function collects 128-bit keys at a time, and generates thirty-two 32-bit encryption keys after XOR operation, nonlinear permutation operation (S-box) and linear shift operatio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!