Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications

    Qiang Zhi1, Xiang Jiang1, Hangying Zhang2, Zhengshu Zhou3, Jianguo Ren1, Tong Huang4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 389-402, 2023, DOI:10.32604/csse.2023.035576 - 20 January 2023

    Abstract The lightweight encryption algorithm based on Add-Rotation-XOR (ARX) operation has attracted much attention due to its high software affinity and fast operation speed. However, lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm. The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost. This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes. Firstly, we specify a More >

  • Open Access

    ARTICLE

    Lightweight Algorithm for MQTT Protocol to Enhance Power Consumption in Healthcare Environment

    Anwar D. Alhejaili*, Omar H. Alhazmi

    Journal on Internet of Things, Vol.4, No.1, pp. 21-33, 2022, DOI:10.32604/jiot.2022.019893 - 16 May 2022

    Abstract Internet of things (IoT) is used in various fields such as smart cities, smart home, manufacturing industries, and healthcare. Its application in healthcare has many advantages and disadvantages. One of its most common protocols is Message Queue Telemetry Transport (MQTT). MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power. One of the drawbacks of MQTT is that it is easy to manipulate. The default security provided by MQTT during user authentication, through username and password, does not provide any type of data encryption, to ensure confidentiality or integrity. This… More >

  • Open Access

    ARTICLE

    LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

    Rabie A. Ramadan1,2,*, Bassam W. Aboshosha3, Kusum Yadav1, Ibrahim M. Alseadoon1, Munawar J. Kashout1, Mohamed Elhoseny4,5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.015519 - 01 March 2021

    Abstract With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms… More >

Displaying 1-10 on page 1 of 3. Per Page