{"id":"https://openalex.org/W3206934362","doi":"https://doi.org/10.1109/jiot.2021.3098859","title":"Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-Constrained IoT Devices","display_name":"Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-Constrained IoT Devices","publication_year":2021,"publication_date":"2021-07-21","ids":{"openalex":"https://openalex.org/W3206934362","doi":"https://doi.org/10.1109/jiot.2021.3098859","mag":"3206934362"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3098859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3098859","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076819014","display_name":"Gajraj Kuldeep","orcid":"https://orcid.org/0000-0001-8459-7411"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Gajraj Kuldeep","raw_affiliation_strings":["DIGIT, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"DIGIT, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100360194","display_name":"Qi Zhang","orcid":"https://orcid.org/0000-0001-5303-9804"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Qi Zhang","raw_affiliation_strings":["DIGIT, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"DIGIT, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076819014"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":3.184,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.92335196,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"9","issue":"1","first_page":"165","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11210","display_name":"Mathematical Analysis and Transform Methods","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8713504076004028},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7068852782249451},{"id":"https://openalex.org/keywords/memory-footprint","display_name":"Memory footprint","score":0.46252426505088806},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.46142250299453735},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.46018725633621216},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.4256115257740021},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4097940921783447},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.38233646750450134},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3283582329750061},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30129459500312805},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2127184271812439}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8713504076004028},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7068852782249451},{"id":"https://openalex.org/C74912251","wikidata":"https://www.wikidata.org/wiki/Q6815727","display_name":"Memory footprint","level":2,"score":0.46252426505088806},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.46142250299453735},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.46018725633621216},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.4256115257740021},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4097940921783447},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.38233646750450134},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3283582329750061},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30129459500312805},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2127184271812439},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2021.3098859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3098859","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/760a082b-c7b1-4b99-b6c6-a4113ae1ebbf","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/760a082b-c7b1-4b99-b6c6-a4113ae1ebbf","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kuldeep, G & Zhang, Q 2022, 'Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-constrained IoT Devices', IEEE Internet of Things Journal, vol. 9, no. 1, pp. 165-181. https://doi.org/10.1109/JIOT.2021.3098859","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8799999952316284}],"awards":[{"id":"https://openalex.org/G8567136059","display_name":null,"funder_award_id":"8057-00059B","funder_id":"https://openalex.org/F4320313796","funder_display_name":"Innovationsfonden"}],"funders":[{"id":"https://openalex.org/F4320313796","display_name":"Innovationsfonden","ror":"https://ror.org/00daj4111"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1763925716","https://openalex.org/W2014778838","https://openalex.org/W2015135875","https://openalex.org/W2015418199","https://openalex.org/W2035458709","https://openalex.org/W2044628510","https://openalex.org/W2051834746","https://openalex.org/W2058219874","https://openalex.org/W2081079920","https://openalex.org/W2095409369","https://openalex.org/W2104266187","https://openalex.org/W2104846280","https://openalex.org/W2106287110","https://openalex.org/W2119667497","https://openalex.org/W2129131372","https://openalex.org/W2142247058","https://openalex.org/W2145096794","https://openalex.org/W2150010995","https://openalex.org/W2150780437","https://openalex.org/W2160732418","https://openalex.org/W2169382889","https://openalex.org/W2190983062","https://openalex.org/W2394634174","https://openalex.org/W2395992695","https://openalex.org/W2482792214","https://openalex.org/W2525586417","https://openalex.org/W2534039953","https://openalex.org/W2606537796","https://openalex.org/W2768145056","https://openalex.org/W2786204441","https://openalex.org/W2793404470","https://openalex.org/W2895912163","https://openalex.org/W2898711294","https://openalex.org/W2901575149","https://openalex.org/W2905459276","https://openalex.org/W2942228371","https://openalex.org/W2963607629","https://openalex.org/W2980432616","https://openalex.org/W3022380717","https://openalex.org/W3036585941","https://openalex.org/W3102460953","https://openalex.org/W3125509369","https://openalex.org/W3131468365","https://openalex.org/W3134267570","https://openalex.org/W3135328928","https://openalex.org/W4234417735","https://openalex.org/W4250540142","https://openalex.org/W4250955649","https://openalex.org/W4302067267"],"related_works":["https://openalex.org/W2158224665","https://openalex.org/W2379589510","https://openalex.org/W4300044672","https://openalex.org/W1881631164","https://openalex.org/W2810730439","https://openalex.org/W1976264255","https://openalex.org/W2358292267","https://openalex.org/W2378166785","https://openalex.org/W1964277756","https://openalex.org/W2465351041"],"abstract_inverted_index":{"Compressive":[0],"sensing":[1,111,211],"(CS)":[2],"can":[3],"provide":[4],"joint":[5],"compression":[6],"and":[7,20,38,122,241],"encryption,":[8],"which":[9,170],"is":[10,47,71,158,192],"promising":[11],"to":[12,49,52,109,113,140],"address":[13],"the":[14,24,42,59,88,97,127,132,146,149,162,168,172,178,189,200,204,210,214,219,228],"challenges":[15],"of":[16,26,87,99,148,164,180,208,237],"massive":[17],"sensor":[18],"data":[19,21],"security":[22,185],"in":[23,40,131,213,235],"Internet":[25],"Things":[27],"(IoT).":[28],"However,":[29],"as":[30],"IoT":[31],"devices":[32],"have":[33],"constrained":[34],"memory,":[35],"computing":[36],"power,":[37],"energy,":[39,94],"practice":[41],"CS-based":[43,60],"computationally":[44],"secure":[45,62,90,102,193],"scheme":[46,63,91,191,202,230],"shown":[48],"be":[50],"vulnerable":[51],"ciphertext-only":[53],"attack":[54],"for":[55],"short-signal":[56],"length.":[57],"Although":[58],"perfectly":[61,89],"has":[64],"no":[65],"such":[66],"vulnerabilities,":[67],"its":[68],"practical":[69,85],"realization":[70,86],"challenging.":[72],"In":[73],"this":[74],"article,":[75],"we":[76,135],"propose":[77,105],"an":[78,100],"energy":[79,115,130,166,243],"concealment":[80],"(EC)":[81],"encryption":[82,233],"scheme,":[83,134],"a":[84,137,153],"by":[92,160],"concealing":[93],"thereby":[95],"removing":[96],"requirement":[98],"additional":[101],"channel.":[103],"We":[104,198],"three":[106,205],"different":[107,206],"methods":[108],"generate":[110],"matrix":[112,212],"improve":[114],"efficiency":[116],"using":[117,203,218],"linear":[118],"feedback":[119],"shift":[120],"registers":[121],"lagged":[123],"Fibonacci":[124],"sequences.":[125],"Leveraging":[126],"signal\u2019s":[128],"maximum":[129,165],"EC":[133,190,201,229],"design":[136],"new":[138,154],"measure":[139],"evaluate":[141],"reconstructed":[142],"signal":[143,173],"quality":[144,175],"without":[145],"knowledge":[147,163],"original":[150],"signal.":[151],"Furthermore,":[152],"CS":[155],"decoding":[156],"algorithm":[157],"designed":[159],"incorporating":[161],"at":[167],"decoder,":[169],"improves":[171],"reconstruction":[174],"while":[176],"reducing":[177],"number":[179],"measurements.":[181],"Additionally,":[182],"our":[183],"comprehensive":[184],"analysis":[186],"shows":[187],"that":[188,227],"against":[194],"various":[195],"cryptographic":[196],"attacks.":[197],"implement":[199],"ways":[207],"generating":[209],"resource-constrained":[215],"TelosB":[216],"mote":[217],"Contiki":[220],"operating":[221],"system.":[222],"The":[223],"experimental":[224],"results":[225],"demonstrate":[226],"outperforms":[231],"advanced":[232],"standard":[234],"terms":[236],"code":[238],"memory":[239],"footprint":[240],"total":[242],"consumption.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":9}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
