Lightweight Cryptography Algorithms for Internet of ThingsEnabled Networks.A Comparative Study
Journal Title: International Journal of Innovations in Science and Technology - Year 2024, Vol 6, Issue 4
Abstract
The rapid advancement of technology has facilitated the interconnection of numerous devices, enabling the collection of vast amounts of data. Consequently, ensuring security within IoT networks has become a top priority. Cryptography is crucial in safeguarding network authentication, confidentiality, data integrity, and access control. In IoT settings, conventional cryptographic protocols frequently prove impractical owing to the limitations confronting IoT devices. Consequently, scholars have suggested multiple lightweight cryptographic algorithms and protocols customized for safeguarding data in IoT networks, aiming to overcome this hurdle. This review article delves into the most recent lightweight cryptographic protocols designed for IoT networks and furnishes a comparative evaluation of prevalent modern block ciphers. The comparative study discusses the most recent lightweight cryptographic algorithms in different evaluation parameters in terms of their performance metrics, and cryptographic features and offers in-depth analysis of their efficiency. In the concluding section, the paper discusses necessary adaptations and suggests future research directions.
Authors and Affiliations
JavariaKhalid, Rabbia Ijaz, Rida Fatima, Umer Nawaz
Hybrid Technique forEstimating Fetal Head Circumference Using Ultrasound Imaging
Introduction: Analysis of fetal head shape is crucial for assessing head growth and detecting abnormalities in fetuses. In traditional clinical practice, Head Circumference (HC) is determined by manually fitting an ell...
AI-Based Predictive Tool-Life Computation in Manufacturing Industry
For maximum productivity and optimal utilization of tools, predictive maintenance serves as a standard operation procedure in the manufacturing industry. However, unnecessary or delayed maintenance both causes increas...
Numerical Simulation of Flow Past a Square Object Detached with Controlling Object at Various Reynolds Number
A two-dimensional (2-D) numerical study has been conducted for flow past of two different configurations of square objects by using the numerical technique Lattice Boltzmann Method (LBM). In these configurations, one o...
Implementation of Renthub System: An Intelligent Online Rental Marketplace with ML-Powered Personalized Product Discovery and Recommendations
The rapid expansion of peer-to-peer rental services has significantly influenced the share economy by connecting consumers with short-term access to diverse rental products. However, existing platforms primarily focus...
AustemperingTime and Its Influence on the Mechanical Performance of Inverse Bainite: Insights from Hardness, Toughness, and Strength Testing
This study examines the impact of austempering time on the mechanical properties of 0.8C experimental steel with inverse bainitic microstructures. Samples were austenitized at 900 °C and austempered at 420 °C for 30, 60...