A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT

Author(s):  
Megha Agrawal ◽  
Jianying Zhou ◽  
Donghoon Chang
2017 ◽  
Vol 6 (1) ◽  
pp. 10
Author(s):  
SHREEKANTH T. ◽  
SOWRABHU D ◽  
◽  

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Author(s):  
Shuaitian Wang ◽  
Yuxi Liu ◽  
Yanling Zhang ◽  
Linghe Kong ◽  
Guihai Chen

2018 ◽  
Vol 10 (10) ◽  
pp. 3626 ◽  
Author(s):  
Yousaf Zikria ◽  
Sung Kim ◽  
Muhammad Afzal ◽  
Haoxiang Wang ◽  
Mubashir Rehmani

The Fifth generation (5G) network is projected to support large amount of data traffic and massive number of wireless connections. Different data traffic has different Quality of Service (QoS) requirements. 5G mobile network aims to address the limitations of previous cellular standards (i.e., 2G/3G/4G) and be a prospective key enabler for future Internet of Things (IoT). 5G networks support a wide range of applications such as smart home, autonomous driving, drone operations, health and mission critical applications, Industrial IoT (IIoT), and entertainment and multimedia. Based on end users’ experience, several 5G services are categorized into immersive 5G services, intelligent 5G services, omnipresent 5G services, autonomous 5G services, and public 5G services. In this paper, we present a brief overview of 5G technical scenarios. We then provide a brief overview of accepted papers in our Special Issue on 5G mobile services and scenarios. Finally, we conclude this paper.


2019 ◽  
Vol 15 (9) ◽  
pp. 5052-5063 ◽  
Author(s):  
M. Carmen Lucas-Estan ◽  
Javier Gozalvez

2020 ◽  
Vol 16 (8) ◽  
pp. 5424-5434 ◽  
Author(s):  
Zichao Zhao ◽  
Rui Zhao ◽  
Junjuan Xia ◽  
Xianfu Lei ◽  
Dong Li ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document