{"id":"https://openalex.org/W2624846289","doi":"https://doi.org/10.1109/aiccsa.2016.7945813","title":"More secure Internet of Things using robust encryption algorithms against side channel attacks","display_name":"More secure Internet of Things using robust encryption algorithms against side channel attacks","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2624846289","doi":"https://doi.org/10.1109/aiccsa.2016.7945813","mag":"2624846289"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2016.7945813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2016.7945813","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018011660","display_name":"Lo\u2019ai Tawalbeh","orcid":"https://orcid.org/0000-0002-2294-9829"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]},{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO","SA"],"is_corresponding":true,"raw_author_name":"Lo'ai A. Tawalbeh","raw_affiliation_strings":["Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan","Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035344218","display_name":"Turki F. Somani","orcid":null},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Turki F. Somani","raw_affiliation_strings":["Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018011660"],"corresponding_institution_ids":["https://openalex.org/I156983542","https://openalex.org/I199693650"],"apc_list":null,"apc_paid":null,"fwci":2.5708,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.92324748,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7448338270187378},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7437943816184998},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7145555019378662},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6846199035644531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6606022715568542},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6391692161560059},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5374593734741211},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5173651576042175},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4845818281173706},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.42821869254112244},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.405316561460495},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36902594566345215},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3447962999343872},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08877238631248474}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7448338270187378},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7437943816184998},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7145555019378662},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6846199035644531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6606022715568542},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6391692161560059},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5374593734741211},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5173651576042175},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4845818281173706},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.42821869254112244},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.405316561460495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36902594566345215},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3447962999343872},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08877238631248474},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2016.7945813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2016.7945813","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.47999998927116394}],"awards":[],"funders":[{"id":"https://openalex.org/F4320324047","display_name":"Umm Al-Qura University","ror":"https://ror.org/01xjqrm90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W118467740","https://openalex.org/W659363526","https://openalex.org/W1015721496","https://openalex.org/W1489183424","https://openalex.org/W1527460828","https://openalex.org/W1554128539","https://openalex.org/W1565369953","https://openalex.org/W1613874182","https://openalex.org/W1755227063","https://openalex.org/W1829732909","https://openalex.org/W1969690570","https://openalex.org/W1971377164","https://openalex.org/W2004038008","https://openalex.org/W2016433047","https://openalex.org/W2034793560","https://openalex.org/W2038044753","https://openalex.org/W2053167448","https://openalex.org/W2066315249","https://openalex.org/W2067706455","https://openalex.org/W2084189404","https://openalex.org/W2105913052","https://openalex.org/W2111619626","https://openalex.org/W2123443392","https://openalex.org/W2137567577","https://openalex.org/W2160398557","https://openalex.org/W2185052120","https://openalex.org/W2403478455","https://openalex.org/W2499538570","https://openalex.org/W2593509984","https://openalex.org/W2823896072","https://openalex.org/W4240147753","https://openalex.org/W6631342987","https://openalex.org/W6633902989","https://openalex.org/W6636388380","https://openalex.org/W6637618429","https://openalex.org/W6638519753","https://openalex.org/W6667562111","https://openalex.org/W6675834947","https://openalex.org/W6680672234","https://openalex.org/W6686047836","https://openalex.org/W6734278256"],"related_works":["https://openalex.org/W2004522261","https://openalex.org/W1533979697","https://openalex.org/W2117623867","https://openalex.org/W4253685677","https://openalex.org/W2029006445","https://openalex.org/W4255075415","https://openalex.org/W2102786134","https://openalex.org/W2414747139","https://openalex.org/W1802397081","https://openalex.org/W4226182343"],"abstract_inverted_index":{"There":[0,125],"are":[1,126,150,166,222],"many":[2,59,127],"recent":[3,192],"revolutionary":[4],"advances":[5],"in":[6,28,172],"information":[7],"technology":[8],"that":[9,162],"include:":[10],"wireless":[11],"communication,":[12],"the":[13,19,44,93,115,122,133,158,163,180,191,203,213],"spread":[14],"of":[15,61,79,97],"mobile":[16],"devices,":[17,33,38],"and":[18,70,83,92,104,107,129,135,145,184,194,210],"Internet-of-Things":[20],"(IoT).":[21],"IoT":[22,181],"will":[23,55,75],"have":[24,56],"an":[25],"important":[26],"role":[27],"connecting":[29],"almost":[30],"everything":[31],"(mobile":[32],"cameras,":[34],"home":[35],"appliances,":[36],"healthcare":[37],"military":[39],"equipments,":[40],"...,":[41],"etc)":[42],"to":[43,120,157,169,215],"Internet":[45],"via":[46],"different":[47],"communication":[48],"technologies":[49],"such":[50,64,139,220],"as":[51,65,140],"Wi-Fi.":[52],"This":[53],"connection":[54],"impact":[57],"on":[58,199],"sectors":[60],"our":[62],"life":[63],"industry,":[66],"economy,":[67],"social":[68],"life,":[69],"ICT":[71],"sector.":[72],"Moreover,":[73],"there":[74],"be":[76,101,111,170],"huge":[77],"amounts":[78],"data":[80,99],"(including":[81],"financial":[82],"medical":[84],"records":[85],"for":[86,117,132,202],"example)":[87],"transmitted":[88],"between":[89],"those":[90],"devices":[91,155],"non-secure":[94],"Internet.":[95],"Some":[96],"these":[98,217],"might":[100],"very":[102],"sensitive":[103],"their":[105],"privacy":[106],"security":[108],"must":[109],"not":[110],"compromised.":[112],"Here":[113],"comes":[114],"need":[116],"Cryptographic":[118],"systems":[119],"protect":[121,216],"vital":[123],"data.":[124],"hardware":[128,164],"software":[130],"implementations":[131,201],"symmetric":[134],"asymmetric":[136],"cryptographic":[137],"algorithms":[138,207],"AES,":[141],"Elliptic":[142],"Curve":[143],"Cryptography,":[144],"RSA.":[146],"And":[147],"since":[148],"we":[149,160,178,189],"talking":[151],"about":[152],"protecting":[153],"physical":[154],"connected":[156],"Internet,":[159],"think":[161],"cryptosystems":[165,218],"more":[167],"useful":[168],"used":[171],"this":[173,176],"case.":[174],"In":[175],"paper,":[177],"introduce":[179],"concept,":[182],"applications,":[183],"challenges":[185],"facing":[186],"IoT.":[187],"Then,":[188],"present":[190],"timing":[193],"fault":[195],"Side":[196],"Channel":[197],"Attacks":[198],"cryptosystem":[200],"most":[204],"secure":[205],"encryption":[206],"(AES,":[208],"ECC,":[209],"RSA).":[211],"Also,":[212],"countermeasures":[214],"from":[219],"attacks":[221],"also":[223],"presented.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
