{"id":"https://openalex.org/W2993752794","doi":"https://doi.org/10.1109/wimob.2019.8923144","title":"Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices","display_name":"Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2993752794","doi":"https://doi.org/10.1109/wimob.2019.8923144","mag":"2993752794"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2019.8923144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2019.8923144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048673395","display_name":"Hassan Noura","orcid":"https://orcid.org/0000-0002-2589-5053"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Hassan Noura","raw_affiliation_strings":["Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031503129","display_name":"Rapha\u00ebl Couturier","orcid":"https://orcid.org/0000-0003-1490-9592"},"institutions":[{"id":"https://openalex.org/I2802759292","display_name":"Franche-Comt\u00e9 \u00c9lectronique M\u00e9canique Thermique et Optique - Sciences et Technologies","ror":"https://ror.org/004fmxv66","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I2802759292","https://openalex.org/I37553959","https://openalex.org/I4210095849","https://openalex.org/I4405256580","https://openalex.org/I53262699"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Raphael Couturier","raw_affiliation_strings":["FEMTO-ST Institute, Univ. Bourgogne Franche-Comt\u00e9, Belfort, France"],"affiliations":[{"raw_affiliation_string":"FEMTO-ST Institute, Univ. Bourgogne Franche-Comt\u00e9, Belfort, France","institution_ids":["https://openalex.org/I2802759292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068880132","display_name":"Congduc Pham","orcid":"https://orcid.org/0000-0002-1936-8476"},"institutions":[{"id":"https://openalex.org/I144889574","display_name":"Universit\u00e9 de Pau et des Pays de l'Adour","ror":"https://ror.org/01frn9647","country_code":"FR","type":"education","lineage":["https://openalex.org/I144889574"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Congduc Pham","raw_affiliation_strings":["LIUPPA laboratory, University of Pau, Pau, France"],"affiliations":[{"raw_affiliation_string":"LIUPPA laboratory, University of Pau, Pau, France","institution_ids":["https://openalex.org/I144889574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["Electrical and Computer Engineering, American University of Beirut (AUB), Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, American University of Beirut (AUB), Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048673395"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":2.5204,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.9200573,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8389332890510559},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6208189725875854},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6016239523887634},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5939565896987915},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5691799521446228},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48033156991004944},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4752880334854126},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.46378007531166077},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4444185495376587},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43966278433799744},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4185114800930023},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3670336604118347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26032134890556335},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2413070797920227},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17044055461883545}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8389332890510559},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6208189725875854},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6016239523887634},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5939565896987915},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5691799521446228},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48033156991004944},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4752880334854126},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.46378007531166077},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4444185495376587},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43966278433799744},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4185114800930023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3670336604118347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26032134890556335},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2413070797920227},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17044055461883545},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob.2019.8923144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2019.8923144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W584171051","https://openalex.org/W755318852","https://openalex.org/W1279320161","https://openalex.org/W1556212265","https://openalex.org/W1572352527","https://openalex.org/W1963898916","https://openalex.org/W1988243316","https://openalex.org/W2010523529","https://openalex.org/W2093678351","https://openalex.org/W2150010995","https://openalex.org/W2400329567","https://openalex.org/W2525890499","https://openalex.org/W2610964475","https://openalex.org/W2751986183","https://openalex.org/W2779116847","https://openalex.org/W2792007365","https://openalex.org/W2901794945","https://openalex.org/W3030010127","https://openalex.org/W6712763066","https://openalex.org/W6736936821","https://openalex.org/W6778747887"],"related_works":["https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W1638546798","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W2339543721","https://openalex.org/W4390979909","https://openalex.org/W1514794536","https://openalex.org/W1829339118","https://openalex.org/W4389575897"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,26,34,53,135],"Things":[3],"(IoT)":[4],"systems":[5],"are":[6,123],"vulnerable":[7],"to":[8,42,79,96,125],"many":[9],"security":[10,83],"threats":[11],"that":[12,127],"may":[13],"have":[14],"drastic":[15],"impacts.":[16],"Existing":[17],"cryptographic":[18,103],"solutions":[19],"do":[20],"not":[21],"cater":[22],"for":[23,31,111,142],"the":[24,75,87,90,98,128],"limitations":[25],"resource-constrained":[27,143],"IoT":[28,36,144],"devices,":[29],"nor":[30],"real-time":[32],"requirements":[33],"some":[35],"applications.":[37],"Therefore,":[38],"it":[39,140],"is":[40,69],"essential":[41],"design":[43],"new":[44],"efficient":[45],"cipher":[46,66,130],"schemes":[47],"with":[48],"low":[49],"overhead":[50],"in":[51,106],"terms":[52],"delay":[54],"and":[55,85,116,137],"resource":[56],"requirements.":[57],"In":[58,100],"this":[59],"paper,":[60],"we":[61],"propose":[62],"a":[63,81,107,132],"lightweight":[64,109],"stream":[65],"scheme,":[67],"which":[68],"based,":[70],"on":[71,74,86],"one":[72],"hand,":[73,89],"dynamic":[76,108],"key-dependent":[77],"approach":[78],"achieve":[80],"high":[82,133],"level,":[84],"other":[88],"scheme":[91],"involves":[92],"few":[93],"simple":[94],"operations":[95],"minimize":[97],"overhead.":[99],"our":[101],"approach,":[102],"primitives":[104],"change":[105],"manner":[110],"each":[112],"input":[113],"block.":[114],"Security":[115],"performance":[117],"study":[118],"as":[119,121],"well":[120],"experimentation":[122],"performed":[124],"validate":[126],"proposed":[129],"achieves":[131],"level":[134],"efficiency":[136],"robustness,":[138],"making":[139],"suitable":[141],"devices.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
