2021
DOI: 10.21123/bsj.2021.18.2(suppl.).0989
|View full text |Cite
|
Sign up to set email alerts
|

A Scoping Study on Lightweight Cryptography Reviews in IoT

Abstract: The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 61 publications
(32 reference statements)
0
10
0
Order By: Relevance
“…The cipher algorithm can involve more than 1 of the above-mentioned categorization methods; for example, the algorithm may be symmetric key using (s-p) in encryption, processing plain text as blocks, and lightweight type (Chiadighikaobi and Katuk, 2021).…”
Section: Cipher Classificationmentioning
confidence: 99%
“…The cipher algorithm can involve more than 1 of the above-mentioned categorization methods; for example, the algorithm may be symmetric key using (s-p) in encryption, processing plain text as blocks, and lightweight type (Chiadighikaobi and Katuk, 2021).…”
Section: Cipher Classificationmentioning
confidence: 99%
“…Small computing devices are becoming more widespread and emerged as an essential part of the Internet of Things (IoT). It is the backbone of applications in various domains like healthcare, agriculture, transportation, smart cities [1]. In this type of network, devices send a large volume of sensitive data; therefore, data security is the researchers' main concern, primarily through encryption algorithms [2].…”
Section: Introductionmentioning
confidence: 99%
“…They cannot achieve acceptable hardware conditions and performance with their limited power supply [3]. Therefore, lightweight encryption algorithms become the best option to ensure the security of such information [1,[4][5][6] that is generated by such small devices [5,7]. Furthermore, resource-constraint environments require lightweight cryptography to accommodate features of compact implementation, small memory, and low power supply [1].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations