{"id":"https://openalex.org/W4417439138","doi":"https://doi.org/10.1109/tce.2025.3645059","title":"Secure IoT Communications With Optimized AES and Dynamic Threat Modeling on Embedded System","display_name":"Secure IoT Communications With Optimized AES and Dynamic Threat Modeling on Embedded System","publication_year":2025,"publication_date":"2025-12-17","ids":{"openalex":"https://openalex.org/W4417439138","doi":"https://doi.org/10.1109/tce.2025.3645059"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3645059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3645059","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007699285","display_name":"Koustav Kumar Mondal","orcid":"https://orcid.org/0000-0003-1679-1030"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Koustav Kumar Mondal","raw_affiliation_strings":["Centre for AIoT and Applications, IIT Jodhpur, Jodhpur, Rajasthan, India","Centre for AIoT and Applications, IIT Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"Centre for AIoT and Applications, IIT Jodhpur, Jodhpur, Rajasthan, India","institution_ids":["https://openalex.org/I154549908"]},{"raw_affiliation_string":"Centre for AIoT and Applications, IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085249491","display_name":"Himani Sikarwar","orcid":"https://orcid.org/0000-0003-4754-3806"},"institutions":[{"id":"https://openalex.org/I26604189","display_name":"Shiv Nadar University","ror":"https://ror.org/05aqahr97","country_code":"IN","type":"education","lineage":["https://openalex.org/I26604189"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Himani Sikarwar","raw_affiliation_strings":["Department of CSE, Shiv Nadar Institute of Eminence, Delhi, India","Dept. of CSE, Shiv Nadar Institute of Eminence, Delhi NCR, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Shiv Nadar Institute of Eminence, Delhi, India","institution_ids":["https://openalex.org/I26604189"]},{"raw_affiliation_string":"Dept. of CSE, Shiv Nadar Institute of Eminence, Delhi NCR, India","institution_ids":["https://openalex.org/I26604189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029519822","display_name":"Debasis Das","orcid":"https://orcid.org/0000-0001-6205-4096"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasis Das","raw_affiliation_strings":["Department of CSE, IIT Jodhpur, Jodhpur, Rajasthan, India","Dept. of CSE, IIT Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, IIT Jodhpur, Jodhpur, Rajasthan, India","institution_ids":["https://openalex.org/I154549908"]},{"raw_affiliation_string":"Dept. of CSE, IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014245712","display_name":"Chun\u2010I Fan","orcid":"https://orcid.org/0000-0002-7512-1291"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]},{"id":"https://openalex.org/I192168892","display_name":"National University of Kaohsiung","ror":"https://ror.org/013zjb662","country_code":"TW","type":"education","lineage":["https://openalex.org/I192168892"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chun-I Fan","raw_affiliation_strings":["Department of CSE, NSYSU, Kaohsiung, Taiwan","Dept. of CSE, NSYSU, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of CSE, NSYSU, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I192168892"]},{"raw_affiliation_string":"Dept. of CSE, NSYSU, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007699285"],"corresponding_institution_ids":["https://openalex.org/I154549908"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21710147,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"971","last_page":"982"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9043999910354614,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9043999910354614,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.031300000846385956,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.013500000350177288,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5799000263214111},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.579200029373169},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5745000243186951},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5189999938011169},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4977000057697296},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4740999937057495},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.45590001344680786},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.4438999891281128},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.44130000472068787},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4090999960899353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.732200026512146},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6039999723434448},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5799000263214111},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.579200029373169},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5745000243186951},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5189999938011169},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4977000057697296},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4740999937057495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46160000562667847},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.45590001344680786},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.4438999891281128},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.44130000472068787},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4090999960899353},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3828999996185303},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.367900013923645},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32359999418258667},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3176000118255615},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3061000108718872},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3052000105381012},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.30309998989105225},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.30140000581741333},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.2944999933242798},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.29010000824928284},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.28189998865127563},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.275299996137619},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2745000123977661},{"id":"https://openalex.org/C118021083","wikidata":"https://www.wikidata.org/wiki/Q610398","display_name":"System on a chip","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.262800008058548},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.2596000134944916},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3645059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3645059","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,39,44,64,172],"hardware":[4],"cryptographic":[5,177],"solution":[6],"that":[7,68,166],"leverages":[8],"an":[9,18],"InvenSense":[10],"6-axis":[11],"Motion":[12],"Processing":[13],"Unit":[14],"(MPU6050)":[15],"sensor":[16],"and":[17,27,48,63,71,81,113,147,175,186],"ESP32":[19],"microcontroller":[20],"to":[21,102,105,149],"address":[22],"the":[23,133,167],"need":[24],"for":[25,59,154,179],"secure":[26],"efficient":[28],"communication":[29],"in":[30],"resource-constrained":[31],"Internet":[32],"of":[33,151],"Things":[34],"(IoT)":[35],"devices,":[36],"we":[37],"introduce":[38],"hardware-conscious,":[40],"lightweight":[41],"AES-128":[42],"with":[43,54],"two-phase":[45],"(4-bit)":[46],"S-box":[47],"simplified":[49],"MixColumns":[50],"over":[51,132],"GF(28),":[52],"integrated":[53],"Elliptic":[55],"Curve":[56],"Diffie\u2013Hellman":[57],"(ECDH)":[58],"forward-secret":[60],"key":[61],"establishment,":[62],"dynamic":[65],"threat-modeling":[66],"algorithm":[67],"quantifies":[69],"risk":[70],"triggers":[72],"targeted":[73],"mitigations.":[74],"A":[75],"reconfigurable":[76],"architecture":[77],"physically":[78],"separates":[79],"block-cipher":[80],"hash":[82],"paths,":[83],"enabling":[84],"concurrent":[85],"operations":[86],"needed":[87],"by":[88,100,121],"protocols":[89],"such":[90],"as":[91],"TLS/IPsec.":[92],"On":[93],"ESP32,":[94],"our":[95],"device":[96],"reduces":[97],"encryption":[98],"time":[99],"up":[101],"42.4%":[103],"compared":[104],"representative":[106],"baselines;":[107],"it":[108],"achieves":[109],"28.57%":[110],"at":[111,115,136],"100KB":[112],"30%":[114],"50":[116],"KB.":[117,157],"Energy":[118],"consumption":[119],"decreases":[120],"16.7%\u201328.57%":[122],"across":[123],"payloads,":[124],"while":[125,188],"throughput":[126],"reaches":[127],"435":[128],"Mbps":[129],"(about":[130],"+3.57%":[131],"strongest":[134],"comparator":[135],"500":[137],"KB).":[138],"The":[139],"one-time":[140],"ECDH":[141],"overhead":[142],"is":[143],"8.1":[144],"ms/1.14":[145],"mJ":[146],"amortizes":[148],"<5%":[150],"total":[152],"energy":[153],"payloads":[155],">100":[156],"These":[158],"results,":[159],"obtained":[160],"under":[161],"rigorous":[162],"experimental":[163],"profiling,":[164],"demonstrate":[165],"proposed":[168],"hardware\u2013algorithm":[169],"co-design":[170],"delivers":[171],"secure,":[173],"high-performance,":[174],"energy-efficient":[176],"substrate":[178],"diverse":[180],"IoT":[181],"deployments,":[182],"strengthening":[183],"both":[184],"confidentiality":[185],"resilience":[187],"fitting":[189],"tight":[190],"resource":[191],"budgets.":[192]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-17T00:00:00"}
