2021
DOI: 10.1109/jiot.2020.3044526
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(17 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…The users are available with a lot of encryption methods. The encryption methods can be classified as AES like structures that are obtained from optimizing strong AES cipher, Bit Permutation-Based Techniques, Cellular Automata-Based Techniques, or others [11][12][13][14][15][16][17][18][19][20][21].…”
Section: Related Studymentioning
confidence: 99%
See 1 more Smart Citation
“…The users are available with a lot of encryption methods. The encryption methods can be classified as AES like structures that are obtained from optimizing strong AES cipher, Bit Permutation-Based Techniques, Cellular Automata-Based Techniques, or others [11][12][13][14][15][16][17][18][19][20][21].…”
Section: Related Studymentioning
confidence: 99%
“…LWC includes many mechanisms like PRESENT, CLEFIA, SIMON, SPECK, SKINNY, ZORRO, HIGHT, XTEA, encoder-based, cellular-automata-based, bit-permutation-based, etc. [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. In past years, the community of lightweight cryptography has developed many mechanisms suitable for IoT and other similar environments.…”
Section: Introductionmentioning
confidence: 99%
“…The IoT is the new tech of our age, with billions of electronic gadgets sharing massive amounts of protected data. The private image collected by industrial IoT has evolved and is linked to the user's IoT nodes or peripheral devices [3]. Multimedia has developed rapidly with the introduction of internet technologies, allowing people to share data in images, video, audio, biometric images, medical imaging, military, diplomatic, national security agencies, and their equivalents in the IoT [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…-MOZIPO and ACKEN [11] published a comparative survey of lightweight cryptographic algorithms, their strengths, weaknesses, and general security requirements, such as integrity, confidentiality, and authentication. [12] compared the 32 LWC second-round candidates for features such as performance and power. [13] focuses on surveying certain lightweight block ciphers that can easily be implemented in resource challenge devices; such ciphers include PRESENT, SIMON, and GRAIN.…”
mentioning
confidence: 99%