The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1109/jiot.2020.3033435
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Security Algorithm for Power-Constrained IoT Devices

Abstract: Internet of Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques, due to their constrained nature. Classical security algorithms which are built on complex cryptographic functions often require a level of processing that low power IoT devices are incapable to effectively achieve due to limited power and processing resources. Consequently, the option for constrained IoT devices lies in either developing new security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 55 publications
0
3
0
Order By: Relevance
“…Similarly work in Huang [15], Wei et al [16], Abd El-Latif et al [17], Li et al [18], Mamvong et al [19], Niu et al [20], which propose use of multiple authority attribute-based encryption, blockchain based data access control ABE (DAC ABE), controlled alternate quantum walks (CAQWs), Decisional Bilinear Diffie-Hellman (DBDH), power efficient encryption, and key aggregation searchable encryption (KASE), which assist in improving performance of encryption under different use cases. Extensions to these models are discussed in Fotovvat et al [21], Fotovvat et al [22], Khan et al [23], Hussain et al [24], Khashan [25] which propose use of Lightweight cryptography (LWC), Key-Policy Attribute Based Encryption (KPABE), Secure Surveillance Mechanism, Certificate Based Signcryption with Proxy Re-Encryption (CBSRE), and Lightweight Proxy Re-Encryption, which assists in improving security performance for different use cases.…”
Section: Introductionmentioning
confidence: 67%
“…Similarly work in Huang [15], Wei et al [16], Abd El-Latif et al [17], Li et al [18], Mamvong et al [19], Niu et al [20], which propose use of multiple authority attribute-based encryption, blockchain based data access control ABE (DAC ABE), controlled alternate quantum walks (CAQWs), Decisional Bilinear Diffie-Hellman (DBDH), power efficient encryption, and key aggregation searchable encryption (KASE), which assist in improving performance of encryption under different use cases. Extensions to these models are discussed in Fotovvat et al [21], Fotovvat et al [22], Khan et al [23], Hussain et al [24], Khashan [25] which propose use of Lightweight cryptography (LWC), Key-Policy Attribute Based Encryption (KPABE), Secure Surveillance Mechanism, Certificate Based Signcryption with Proxy Re-Encryption (CBSRE), and Lightweight Proxy Re-Encryption, which assists in improving security performance for different use cases.…”
Section: Introductionmentioning
confidence: 67%
“…IoT ecosystems' sheer scale and heterogeneity contribute to an inherently complex security landscape where a one-size-fits-all approach is untenable. Researchers emphasized that the constrained nature of many IoT devices, characterized by limited processing power and memory, amplifies the challenge of implementing robust security measures (Mamvong et al, 2020;Pisani et al, 2020;Samaila et al, 2018;Singh et al, 2017). These resource limitations hinder the incorporation of sophisticated security protocols and make devices susceptible to resource-intensive attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore additional hardware peripherals are often employed to provide security functionalities to custom solutions. In particular, hardware secure elements are exploited to provide additional computational capabilities in cryptographic operations or to provide additional security functionalities required by the applications [ 35 ]. They provides special storage capability that enable secure storage of sensitive data (e.g., encryption keys and other secrets).…”
Section: Hardware Secure Elementmentioning
confidence: 99%