{"id":"https://openalex.org/W4407639651","doi":"https://doi.org/10.1109/acit62805.2024.10876960","title":"A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography","display_name":"A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407639651","doi":"https://doi.org/10.1109/acit62805.2024.10876960"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10876960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10876960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080292859","display_name":"Mohammad Rasmi Al-Mousa","orcid":"https://orcid.org/0000-0002-5176-0910"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mohammad Rasmi Al-Mousa","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116296153","display_name":"Mohammad Abdulqawi","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Abdulqawi","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032352831","display_name":"Hazem Jihad Badarneh","orcid":"https://orcid.org/0000-0002-1727-0758"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hazem Jihad Badarneh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047001244","display_name":"Ala\u2019a Al-Shaikh","orcid":"https://orcid.org/0000-0002-1888-759X"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ala\u2019a Al-Shaikh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079544101","display_name":"Mahmoud Rajallah Asassfeh","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mahmoud Asassfeh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078986471","display_name":"Ala'a Saeb Al-Sherideh","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ala'a Saeb Al-Sherideh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020925471","display_name":"Ghassan Samara","orcid":"https://orcid.org/0000-0001-8415-0572"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ghassan Samara","raw_affiliation_strings":["Zarqa University,Department of Computer Science,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Computer Science,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040109082","display_name":"Ali Elrashidi","orcid":"https://orcid.org/0000-0002-8560-1395"},"institutions":[{"id":"https://openalex.org/I4210165529","display_name":"University of Business and Technology","ror":"https://ror.org/05tcr1n44","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210165529"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ali Elrashidi","raw_affiliation_strings":["University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"],"affiliations":[{"raw_affiliation_string":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432","institution_ids":["https://openalex.org/I4210165529"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065080992","display_name":"Raed Alazaidah","orcid":"https://orcid.org/0000-0002-1818-4288"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Raed Alazaidah","raw_affiliation_strings":["Zarqa University,Faculty of Information Technology,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Faculty of Information Technology,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5080292859"],"corresponding_institution_ids":["https://openalex.org/I153687341"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28483346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.944100022315979,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.944100022315979,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7440561652183533},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7092761993408203},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6389093995094299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5559480786323547},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38045790791511536},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3436845541000366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7440561652183533},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7092761993408203},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6389093995094299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5559480786323547},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38045790791511536},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3436845541000366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62805.2024.10876960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10876960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2045219129","https://openalex.org/W2105103777","https://openalex.org/W2143321474","https://openalex.org/W2513712568","https://openalex.org/W2533632459","https://openalex.org/W2915432143","https://openalex.org/W2962751917","https://openalex.org/W3011270356","https://openalex.org/W3119336346","https://openalex.org/W3124834193","https://openalex.org/W3136931855","https://openalex.org/W3186377741","https://openalex.org/W4205670975","https://openalex.org/W4298127707","https://openalex.org/W4300554039","https://openalex.org/W4380449766","https://openalex.org/W4384469965","https://openalex.org/W4386010748","https://openalex.org/W4386068584","https://openalex.org/W4386246839","https://openalex.org/W6635163539"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,60,86,126,146],"Things":[3],"(IoT)":[4],"is":[5,41,59],"considered":[6],"the":[7,35,43,74,122,134,144],"base":[8],"factor,":[9],"that":[10,104],"helps":[11],"in":[12,52],"developing":[13],"many":[14],"sectors.":[15],"Additionally,":[16],"IoT":[17,87,118,147],"provides":[18],"novel":[19],"applications":[20],"and":[21,28,37,94,124,128,142],"services,":[22],"i.e.":[23,89],"smart":[24],"homes,":[25],"connected":[26,44],"cars,":[27],"industrial":[29],"automation.":[30],"However,":[31],"this":[32,77],"development":[33],"aggravates":[34],"security":[36,66,123],"privacy":[38],"issues.":[39],"This":[40,109],"because":[42],"devices":[45,88],"may":[46],"be":[47],"vulnerable":[48],"to":[49,54,63,68],"cyber":[50],"attacks":[51],"addition":[53],"generated":[55,127],"data.":[56,130],"Accordingly,":[57],"it":[58],"utmost":[61],"importance":[62],"deploy":[64],"appropriate":[65],"measures":[67],"alleviate":[69],"these":[70],"attacks.":[71],"To":[72],"overcome":[73],"mentioned":[75],"problem,":[76],"work":[78,110],"employs":[79],"lightweight":[80,114],"cryptography":[81,102,115,132],"on":[82],"limited":[83,90,98],"processing":[84],"capabilities":[85,99],"memory,":[91],"computing":[92],"power,":[93],"battery":[95],"life.":[96],"These":[97],"obstruct":[100],"employing":[101],"methods":[103],"require":[105],"nontrivial":[106],"computational":[107],"resources.":[108],"presents":[111],"a":[112],"multiround":[113],"approach":[116],"for":[117],"devices,":[119],"which":[120],"defines":[121],"protection":[125,141],"transferred":[129],"Multi-round":[131],"mitigates":[133],"required":[135],"device":[136],"resources":[137],"while":[138],"ensuring":[139],"robust":[140],"maintaining":[143],"stability":[145],"devices.":[148]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
