Search
Search Results
-
Performance Evaluation of Lightweight ASCON-HASH Algorithm for IoT Devices
Lightweight cryptographic hashing algorithms are designed to be efficient and fast, making them suitable for use in resource-constrained milieus such... -
Comparison Study of Lightweight Hash Functions for an Authentication Solution on IoT
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor... -
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...
-
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may...
-
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...
-
A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...
-
A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions
John, Anita Reji, Alan Manoj, Ajay P Premachandran, Atul Zachariah, Basil Jose, JimmyHash functions serve as the fingerprint of a message. They also... -
Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree
Data protection shares sensitive data with authorized users over a wireless communication network (WCN). To protect the data, a secured sharing...
-
Enhancement of Lightweight Secure Blockchain Based Edward-El Gamal in the Internet of Things (IoT)
The Internet of Things (IoT) refers to the vast network of interconnected devices that collect, exchange, and analyze data, enabling automation and...
-
A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications
In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary... -
Implementation of Photon Hash Function on FPGA
Every day, a large amount of data is transmitted through the Internet. It is essential that a message be sent to the recipient directly from the... -
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management....
-
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain
The trusted interaction of on-chain and off-chain data is an important foundation for large-scale applications of blockchain systems. When the...
-
Simple, secure and lightweight authentication protocol with session-key generation for IIoT device in IIoT networks
Device authentication is essential for protecting IIoT networks due to the industrial internet of things (IIoT) rise in connected devices. This work...
-
Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things
The Internet of Things (IoT) is rapidly permeating critical domains, enabling the interconnection and utilization of diverse devices on a large scale...
-
Comparative Study of Keccak and Blake2 Hash Functions
Hashing is so crucial for integrity. Indeed, in order to respond to new technologies requirements, hash functions have always been subject to... -
A Comparison of Lightweight Cryptographic Algorithms
Most IoT devices or WSN devices have limitations on memory, power, and energy consumption. Therefore, it is impossible to implement traditional... -
Nature-Inspired Lightweight Cryptosystems
Examining nature-inspired lightweight cryptosystems, this chapter discusses their emulation of natural processes for efficient and lightweight... -
Implicit Lightweight Proxy Based Key Agreement for the Internet of Things (ILPKA)
Due to the heterogeneity of devices available in the Internet of Things and the limitations of the resources connected to it, simplifying and...
-
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for...