scholarly journals Compact Lightweight Cryptographic Algorithmfor Optimizationof Resources

The study of Lightweight cryptography has been one of the intresting topics in symmetric cryptography in the recent years. Lightweight symmetric ciphers has gained interest due to the increasing demand for security services in constrained computing environments, such as in the Internet of Things(IoT). Though the protocols of light weight in are providingingmore security in variousapplications,resource utility is more in key generation, key scheduling, permutation layer and substitution box layer operations. More resource usage make possibletohave highutilization of power andoverhead of area. In this paper, a novel method is proposed to decrease theutility of resoures, which followsregister reutilization scheme. The resource reutilization is coordinating with the delay inSubstitutionPermutation Network (SPN).Our design is compared, using area, throughput, power, and latency as metrics.

BMC Chemistry ◽  
2021 ◽  
Vol 15 (1) ◽  
Author(s):  
Ahmed M. Senan ◽  
Binru Yin ◽  
Yaoyao Zhang ◽  
Mustapha M. Nasiru ◽  
Yong‐Mei Lyu ◽  
...  

AbstractWith the increasing demand for antimicrobial agents and the spread of antibiotic resistance in pathogens, the exploitation of plant oils to partly replace antibiotic emerges as an important source of fine chemicals, functional food utility and pharmaceutical industries. This work introduces a novel catalytic method of plant oils hydroxylation by Fe(III) citrate monohydrate (Fe3+-cit.)/Na2S2O8 catalyst. Methyl (9Z,12Z)-octadecadienoate (ML) was selected as an example of vegetable oils hydroxylation to its hydroxy-conjugated derivatives (CHML) in the presence of a new complex of Fe(II)-species. Methyl 9,12-di-hydroxyoctadecanoate 1, methyl-9-hydroxyoctadecanoate 2 and methyl (10E,12E)-octadecanoate 3 mixtures is produced under optimized condition with oxygen balloon. The specific hydroxylation activity was lower in the case of using Na2S2O8 alone as a catalyst. A chemical reaction has shown the main process converted of plantoils hydroxylation and (+ 16 Da) of OH- attached at the methyl linoleate (ML-OH). HPLC and MALDI-ToF-mass spectrometry were employed for determining the obtained products. It was found that adding oxidizing agents (Na2S2O8) to Fe3+ in the MeCN mixture with H2O would generate the new complex of Fe(II)-species, which improves the C-H activation. Hence, the present study demonstrated a new functional method for better usage of vegetable oils.Producing conjugated hydroxy-fatty acids/esters with better antipathogenic properties. CHML used in food industry, It has a potential pathway to food safety and packaging process with good advantages, fundamental to microbial resistance. Lastly, our findings showed that biological monitoring of CHML-minimum inhibitory concentration (MIC) inhibited growth of various gram-positive and gram-negative bacteria in vitro study. The produced CHML profiles were comparable to the corresponding to previousstudies and showed improved the inhibition efficiency over the respective kanamycin derivatives.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2019 ◽  
pp. 264-277
Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


Now the Internet of Things (IoT) is growing fast into a large industry with huge potential economic impact expected in near future. The IoT technology evolves to a substrate for resource interconnection and convergence. The users' needs go beyond the existing web-like services, which do not provide satisfactory coupling and automatic composition when the user tries to solve tasks from her/his everyday life. New generation of services (named “smart services”) emerges. In this chapter, we introduce the problem of effective use of the multitude of IoT-enabled devices and other digital resources that now surround our lives. The devices support and assist human by provision of digital services. This is the key objective of a smart environment. Our focus is on such a particular class of smart environments as smart spaces. This class targets IoT-enabled computing environments, where a smart space is created and then provides an infrastructure for applications to construct and deliver value-added services based on cooperative activity of environment participants, either human or machines.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Author(s):  
Yassine Maleh ◽  
Abdelkbir Sahid ◽  
Abdellah Ezzati ◽  
Mustapha Belaissaoui

To deliver security services (integrity, confidentiality, authentication, availability), it is necessary that the communicating nodes share cryptographic keys for encryption and authentication. However, it is well known that the encryption systems represent the first line of defense against all types of attacks. Furthermore, cryptographic techniques must be designed to detect the execution of the most dangerous attacks. In addition, these techniques must be small to fit the limited resources of the WSN. The aims of this chapter are to discuss the mechanisms used to secure communications; to show their main adaptations required for adoption in smart sensors, which are described in the literature, particularly in terms of key management and distribution; and finally, to detail the different solutions proposed in the literature to secure the communication of smart and constrained sensor networks in the internet of things based on cryptography and intrusion detection systems.


Author(s):  
Roumaissa Khelf ◽  
Nacira Ghoualmi-Zine ◽  
Marwa Ahmim

The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.


2020 ◽  
Vol 10 (18) ◽  
pp. 6494
Author(s):  
MeSuk Kim ◽  
ALam Han ◽  
TaeYoung Kim ◽  
JongBeom Lim

Because the Internet of things (IoT) and fog computing are prevalent, an efficient resource consolidation scheme in nanoscale computing environments is urgently needed. In nanoscale environments, a great many small devices collaborate to achieve a predefined goal. The representative case would be the edge cloud, where small computing servers are deployed close to the cloud users to enhance the responsiveness and reduce turnaround time. In this paper, we propose an intelligent and cost-efficient resource consolidation algorithm in nanoscale computing environments. The proposed algorithm is designed to predict nanoscale devices’ scheduling decisions and perform the resource consolidation that reconfigures cloud resources dynamically when needed without interrupting and disconnecting the cloud user. Because of the large number of nanoscale devices in the system, we developed an efficient resource consolidation algorithm in terms of complexity and employed the hidden Markov model to predict the devices’ scheduling decision. The performance evaluation shows that our resource consolidation algorithm is effective for predicting the devices’ scheduling decisions and efficiency in terms of overhead cost and complexity.


Sign in / Sign up

Export Citation Format

Share Document