2021
DOI: 10.3390/fi13110273
|View full text |Cite
|
Sign up to set email alerts
|

Software Design and Experimental Evaluation of a Reduced AES for IoT Applications

Abstract: IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encryption is necessary for security when using these limited-resource devices, but conventional cryptographic algorithms are too heavyweight and resource-demanding to run on IoT infrastructures. This paper presents a lightweight version of AES (called LAES), which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…The main objective is to identify fast, efficient and lightweight encryption scheme for uploading data to the cloud securely without losing data owner’s privacy. Mostly, IoT devices are deployed in environments where there is no provision to provide continuous power supply ( Qasaimeh, Al-Qassas & Ababneh, 2021 ). Advanced Encryption Standard (AES) is a conventional secure symmetric cipher.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The main objective is to identify fast, efficient and lightweight encryption scheme for uploading data to the cloud securely without losing data owner’s privacy. Mostly, IoT devices are deployed in environments where there is no provision to provide continuous power supply ( Qasaimeh, Al-Qassas & Ababneh, 2021 ). Advanced Encryption Standard (AES) is a conventional secure symmetric cipher.…”
Section: Related Workmentioning
confidence: 99%
“…The need for security in IoT systems is depicted in Koduru, Reddy & Padala (2019) . Conventional cryptographic algorithms that are proved to be secure cannot be applied in IoT networks since the devices involved are constrained in terms of computational capabilities and resource constraints ( Qasaimeh, Al-Qassas & Ababneh, 2021 ). Usually, data are uploaded to cloud storage by the gateway devices ( Mrabet et al, 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…In last few years the influence of these vulnerable security systems is emerging steadily with the tremendous growth of smart phones and emerging IoT applications [1,8]. Among various crypto core types used wireless and telecommunications systems AES has steadily emerged in recent years for its advantages such as improved security profile and hierarchical key and physical transform configuration [10,12].…”
Section: ░1 Introductionmentioning
confidence: 99%