References
- A. Rghioui and A. Oumnad, "Internet of Things: Visions, technologies, and areas of application," technology, vol. 6, no. 7, 2017.
- A. Ragab, G. Selim, A. Wahdan, and A. Madani, "Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices," in Security, Privacy, and Anonymity in Computation, Communication, and Storage, (Lecture Notes in Computer Science, 2019, ch. Chapter 1, pp. 5-19.
- M. N. B. Anwar, M. Hasan, M. M. Hasan, J. Z. Loren, and S. T. Hossain, "Comparative Study of Cryptography Algorithms and Its Applications," International Journal of Computer Networks and Communications Security, vol. 7, no. 5, pp. 96-103, 2019.
- T. Poongodi, R. Krishnamurthi, R. Indrakumari, P. Suresh, and B. Balusamy, "Wearable Devices and IoT," in A Handbook of Internet of Things in Biomedical and Cyber Physical System: Springer, 2020, pp. 245-273.
- N. Maryanti, R. Rohana, and M. Kristiawan, "The Principal's Strategy In Preparing Students Ready To Face the Industrial Revolution 4.0," International Journal of Educational Review, vol. 2, no. 1, pp. 54-69, 2020. https://doi.org/10.33369/ijer.v2i1.10628
- M. Hibti, K. Baina, and B. Benatallah, "Towards Swarm Intelligence Architectural Patterns: an IoT-Big Data-AI-Blockchain convergence perspective," in Proceedings of the 4th International Conference on Big Data and Internet of Things, 2019, pp. 1-8.
- M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, and A. P. Sheth, "Machine learning for Internet of Things data analysis: A survey," Digital Communications and Networks, vol. 4, no. 3, pp. 161-175, 2018. https://doi.org/10.1016/j.dcan.2017.10.002
- S. Roy, U. Rawat, H. A. Sareen, and S. K. Nayak, "IECA: an efficient IoT friendly image encryption technique using programmable cellular automata," Journal of Ambient Intelligence and Humanized Computing, pp. 1-20, 2020.
- A. C. Chhoton, "Executing an Effective IoT Security Testing Methodology: A Complete Guideline for Device Developers," 2018.
- L. Marin, M. P. Pawlowski, and A. Jara, "Optimized ECC implementation for secure communication between heterogeneous IoT devices," Sensors, vol. 15, no. 9, pp. 21478-21499, 2015. https://doi.org/10.3390/s150921478
- M. A. U. Rehman, R. Ullah, C.-W. Park, and B. S. Kim, "Towards Network Lifetime Enhancement of Resource Constrained IoT Devices in Heterogeneous Wireless Sensor Networks," Sensors, vol. 20, no. 15, p. 4156, 2020. https://doi.org/10.3390/s20154156
- L. Wei, Y. Chen, Y. Zhang, L. Zhao, and L. Chen, "PSPL: A Generalized Model to Convert Existing Neighbor Discovery Algorithms to Highly-efficient Asymmetric Ones for Heterogeneous IoT Devices," IEEE Internet of Things Journal, 2020.
- S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, "Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions," Journal of Ambient Intelligence and Humanized Computing, pp. 1-18, 2017.
- J. Arshad, M. A. Azad, M. M. Abdeltaif, and K. Salah, "An intrusion detection framework for energy constrained IoT devices," Mechanical Systems and Signal Processing, vol. 136, p. 106436, 2020. https://doi.org/10.1016/j.ymssp.2019.106436
- C. Su, F. Ye, L.-C. Wang, L. Wang, Y. Tian, and Z. Han, "UAV-assisted wireless charging for energy-constrained IoT devices using dynamic matching," IEEE Internet of Things Journal, 2020.
- F. Samie, L. Bauer, and J. Henkel, "Hierarchical Classification for Constrained IoT Devices: A Case Study on Human Activity Recognition," IEEE Internet of Things Journal, 2020.
- T. Sharma, "Lightweight Encryption Algorithms, Technologies, and Architectures in Internet of Things: A Survey," in Innovations in Computer Science and Engineering: Springer, 2020, pp. 341-351.
- M. Saleh, N. Jhanjhi, A. Abdullah, and R. Saher, "IoTES (A Machine learning model) Design dependent encryption selection for IoT devices," in 2022 24th International Conference on Advanced Communication Technology (ICACT), 2022: IEEE, pp. 239-246.
- E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "NIST special publication 800-57," NIST Special publication, vol. 800, no. 57, pp. 1-142, 2007.
- R. Liu, Z. Weng, S. Hao, D. Chang, C. Bao, and X. Li, "Addressless: enhancing IoT server security using IPv6," IEEE Access, vol. 8, pp. 90294-90315, 2020. https://doi.org/10.1109/access.2020.2993700
- E. Barker and N. Mouha, "Recommendation for the triple data encryption algorithm (TDEA) block cipher," National Institute of Standards and Technology, 2017.
- S. Vanstone, "Responses to NIST's proposal," Communications of the ACM, vol. 35, no. 7, pp. 50-52, 1992. https://doi.org/10.1145/138859.138865
- M. Suarez-Albela, P. Fraga-Lamas, and T. M. Fernandez-Carames, "A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices," Sensors, vol. 18, no. 11, p. 3868, 2018. https://doi.org/10.3390/s18113868
- M. A. Asbullah and M. R. Kamel, "Design and Analysis of Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative," IJCR, vol. 9, no. 1, pp. 19-51, 2019.
- M. O. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Massachusetts Inst of Tech Cambridge Lab for Computer Science, 1979.
- M. Boesgaard, M. Vesterager, T. Christensen, and E. Zenner, "The stream cipher rabbit," ECRYPT Stream Cipher Project Report, vol. 6, p. 28, 2005.
- J.-P. Aumasson, S. Fischer, S. Khazaei, W. Meier, and C. Rechberger, "New features of Latin dances: analysis of Salsa, ChaCha, and Rumba," in International Workshop on Fast Software Encryption, 2008: Springer, pp. 470-488.
- S. Dey and S. Sarkar, "Improved analysis for reduced round Salsa and Chacha," Discrete Applied Mathematics, vol. 227, pp. 58-69, 2017. https://doi.org/10.1016/j.dam.2017.04.034
- A. R. Choudhuri and S. Maitra, "Differential Cryptanalysis of Salsa and ChaCha-An Evaluation with a Hybrid Model," IACR Cryptol. ePrint Arch., vol. 2016, p. 377, 2016.
- "Fernet (symmetric encryption)." [Online]. Available: https://cryptography.io/en/latest/fernet/.
- H. AlKhzaimi and M. M. Lauridsen, "Cryptanalysis of the SIMON Family of Block Ciphers," IACR Cryptol. ePrint Arch., vol. 2013, p. 543, 2013.
- "Analysis of RC2." [Online]. Available: https://www.cryptrec.go.jp/exreport/cryptrec-ex-1042-2001.pdf.
- S. Khazaei, "Neutrality-Based Symmetric Cryptanalysis," EPFL, 2010.
- X. Zhou, J. Li, X. Lai, and H. Yan, "Revisit and Cryptanalysis of a CAST Cipher," DEStech Transactions on Computer Science and Engineering, no. ICEITI, 2017.
- L. Elbaz and H. Bar-El, "Strength assessment of encryption algorithms," White paper, 2000.
- M. Ebrahim, S. Khan, and U. B. Khalid, "Symmetric algorithm survey: a comparative analysis," arXiv preprint arXiv:1405.0398, 2014.
- J. Yu, "Is there a case to prefer Ed25519 over ECDSA P-256 for DNSSEC?."
- J.-P. Aumasson et al., "SPHINCS," 2019.
- D. Amiet, A. Curiger, and P. Zbinden, "FPGA-based accelerator for post-quantum signature scheme SPHINCS-256," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 18-39, 2018.
- A. Hulsing, J. Rijneveld, and P. Schwabe, "Armed sphincs," in Public-Key Cryptography-PKC 2016: Springer, 2016, pp. 446-470.
- K. Schmidt-Samoa, "A new rabin-type trapdoor permutation equivalent to factoring," Electronic Notes in Theoretical Computer Science, vol. 157, no. 3, pp. 79-94, 2006. https://doi.org/10.1016/j.entcs.2005.09.039
- D. D. Berendsen, "A Comparative Study on Signature Schemes for IoT Devices," 2021.
- A. F. Gutierrez and M. Naya-Plasencia, "Improving keyrecovery in linear attacks: Application to 28-round PRESENT," in EUROCRYPT 2020-Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2021, no. 12105: Springer, pp. 221-249.
- S. Ahmadi, M. Delavar, J. Mohajeri, and M. R. Aref, "Security analysis of CLEFIA-128," in 2014 11th International ISC Conference on Information Security and Cryptology, 2014: IEEE, pp. 84-88.
- H. Chen and X. Wang, "Improved linear hull attack on round-reduced Simon with dynamic key-guessing techniques," in International Conference on Fast Software Encryption, 2016: Springer, pp. 428-449.
- R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "SIMON and SPECK: Block Ciphers for the Internet of Things," IACR Cryptol. ePrint Arch., vol. 2015, p. 585, 2015.
- Z. Chu, H. Chen, X. Wang, X. Dong, and L. Li, "Improved integral attacks on SIMON32 and SIMON48 with dynamic key-guessing techniques," Security and Communication Networks, vol. 2018, 2018.
- P. Derbez, V. Lallemand, and A. Udovenko, "Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition," in International Conference on Selected Areas in Cryptography, 2019: Springer, pp. 124-145.
- A. Bogdanov and M. Wang, "Zero correlation linear cryptanalysis with reduced data complexity," in International Workshop on Fast Software Encryption, 2012: Springer, pp. 29-48.
- J. Lu, "Related-key rectangle attack on 36 rounds of the XTEA block cipher," International Journal of Information Security, vol. 8, no. 1, pp. 1-11, 2009. https://doi.org/10.1007/s10207-008-0059-9
- E. Yarrkov, "Cryptanalysis of XXTEA," IACR Cryptol. ePrint Arch., vol. 2010, p. 254, 2010.
- S. M. Muzammal, R. K. Murugesan and N. Z. Jhanjhi, "A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4186-4210, 15 March15, 2021, doi: 10.1109/JIOT.2020.3031162.
- S. Ali et al., "Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based," in IEEE Access, vol. 8, pp. 148007-148020, 2020, doi: 10.1109/ACCESS.2020.3014671.
- Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.
- B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.
- Kumar, T., Pandey, B., Mussavi, S.H.A. et al. CTHS Based Energy Efficient Thermal Aware Image ALU Design on FPGA. Wireless Pers Commun 85, 671-696 (2015). https://doi.org/10.1007/s11277-015-2801-8
- Saeed, Soobia, N. Z. Jhanjhi, Mehmood Naqvi, and Mamoona Humayun. "Analysis of software development methodologies." International Journal of Computing and Digital Systems 8, no. 5 (2019): 446-460.
- M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.