{"id":"https://openalex.org/W4210766535","doi":"https://doi.org/10.1142/s0219265921410310","title":"Performance Evaluation of Lightweight Cryptographic Algorithms for Heterogeneous IoT Environment","display_name":"Performance Evaluation of Lightweight Cryptographic Algorithms for Heterogeneous IoT Environment","publication_year":2022,"publication_date":"2022-01-28","ids":{"openalex":"https://openalex.org/W4210766535","doi":"https://doi.org/10.1142/s0219265921410310"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265921410310","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410310","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082213182","display_name":"Mounika Jammula","orcid":"https://orcid.org/0000-0002-1449-043X"},"institutions":[{"id":"https://openalex.org/I134892692","display_name":"Chaitanya Bharathi Institute of Technology","ror":"https://ror.org/047ymzq84","country_code":"IN","type":"education","lineage":["https://openalex.org/I134892692"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mounika Jammula","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I134892692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056219782","display_name":"Venkata Mani Vakamulla","orcid":"https://orcid.org/0000-0001-9491-2534"},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Venkata Mani Vakamulla","raw_affiliation_strings":["Department of Electronics and Communication Engineering, National Institute of Technology, Warangal, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, National Institute of Technology, Warangal, Telangana, India","institution_ids":["https://openalex.org/I121750182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060527332","display_name":"Sai Krishna Kondoju","orcid":"https://orcid.org/0000-0003-2316-8108"},"institutions":[{"id":"https://openalex.org/I134892692","display_name":"Chaitanya Bharathi Institute of Technology","ror":"https://ror.org/047ymzq84","country_code":"IN","type":"education","lineage":["https://openalex.org/I134892692"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sai Krishna Kondoju","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I134892692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082213182"],"corresponding_institution_ids":["https://openalex.org/I134892692"],"apc_list":null,"apc_paid":null,"fwci":1.105,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77579776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"22","issue":"Supp01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8407384157180786},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7061591148376465},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6285318732261658},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6077238321304321},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5445982217788696},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5222780704498291},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4590024948120117},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41501691937446594},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.4116131365299225},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3857630491256714},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38103151321411133},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.30090463161468506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8407384157180786},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7061591148376465},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6285318732261658},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6077238321304321},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5445982217788696},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5222780704498291},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4590024948120117},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41501691937446594},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.4116131365299225},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3857630491256714},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38103151321411133},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30090463161468506},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265921410310","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410310","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W2056312196","https://openalex.org/W2068590323","https://openalex.org/W2116269350","https://openalex.org/W2182138652","https://openalex.org/W2515939469","https://openalex.org/W2519689091","https://openalex.org/W2560211752","https://openalex.org/W2560289169","https://openalex.org/W2616854319","https://openalex.org/W2765739766","https://openalex.org/W2775737669","https://openalex.org/W2782260529","https://openalex.org/W2785733381","https://openalex.org/W2786914706","https://openalex.org/W2790572611","https://openalex.org/W2790742414","https://openalex.org/W2794756467","https://openalex.org/W2805015112","https://openalex.org/W2875475762","https://openalex.org/W2886979527","https://openalex.org/W2890591751","https://openalex.org/W2906598749","https://openalex.org/W2907132583","https://openalex.org/W2954762708","https://openalex.org/W2963903668","https://openalex.org/W2971408581","https://openalex.org/W2972878892","https://openalex.org/W2973142416","https://openalex.org/W2982511610","https://openalex.org/W2982710625","https://openalex.org/W2988698142","https://openalex.org/W2993752794","https://openalex.org/W2995679403","https://openalex.org/W3002366890","https://openalex.org/W3003414371","https://openalex.org/W3005663193","https://openalex.org/W3012167541","https://openalex.org/W3015162172","https://openalex.org/W3017420457","https://openalex.org/W3020290621","https://openalex.org/W3021476248","https://openalex.org/W3034440420","https://openalex.org/W3035828826","https://openalex.org/W3036147309","https://openalex.org/W3036961407","https://openalex.org/W3042039494","https://openalex.org/W3088078896","https://openalex.org/W3094284910","https://openalex.org/W3099027680","https://openalex.org/W3109885655","https://openalex.org/W3128294375","https://openalex.org/W3184693917","https://openalex.org/W4205960969","https://openalex.org/W4233587713","https://openalex.org/W4285513469","https://openalex.org/W4376551398"],"related_works":["https://openalex.org/W3115895850","https://openalex.org/W4387071813","https://openalex.org/W2028363028","https://openalex.org/W3006391074","https://openalex.org/W2374721104","https://openalex.org/W2152230974","https://openalex.org/W2796427561","https://openalex.org/W4321488702","https://openalex.org/W2268540962","https://openalex.org/W3009555975"],"abstract_inverted_index":{"Internet-of-Things":[0],"(IoT)":[1],"is":[2,8,49,60,75,116,199],"an":[3,125],"advanced":[4],"intelligent":[5],"infrastructure,":[6],"which":[7],"formed":[9],"by":[10,208],"using":[11,209],"multiple":[12],"self-organizing":[13],"devices.":[14],"Here,":[15],"the":[16,22,26,35,43,50,57,61,88,92,96,99,108,120,139,166,195,200,210,217,222],"devices":[17,37,62,100],"are":[18,63,101],"utilized":[19],"to":[20,77,86,107,112,118,137,171,203],"examine":[21],"network":[23,59,128],"and":[24,45,82,156,177,190,214],"transfers":[25],"important":[27],"information":[28],"over":[29],"internet.":[30],"In":[31,94],"this":[32,134],"huge":[33],"network,":[34],"unknown":[36],"can":[38,68,215],"create":[39],"various":[40,143,172],"attacks,":[41],"thus":[42],"security":[44,83,219],"privacy":[46],"of":[47,98,181],"data":[48,131],"major":[51,54],"concerns.":[52],"The":[53],"limitation":[55],"in":[56,91,103,226],"IoT":[58,127,227],"battery":[64],"powered,":[65],"so":[66],"they":[67],"store":[69],"low":[70],"inbuilt":[71],"resources.":[72],"Thus,":[73],"it":[74,115],"necessary":[76,117],"identify":[78,119],"more":[79],"resource":[80,224],"optimized":[81],"related":[84],"solutions":[85],"address":[87],"problems":[89],"generated":[90],"network.":[93],"addition,":[95],"resources":[97],"consuming":[102],"higher":[104,218],"speed":[105],"due":[106],"complex":[109],"cryptography":[110,122,154,159,197],"algorithms":[111],"maintain.":[113],"Further,":[114],"suitable":[121],"procedure":[123],"for":[124],"automated":[126],"along":[129],"with":[130,146,169,221],"integrity.":[132],"Therefore,":[133],"article":[135],"aims":[136],"introduce":[138],"detailed":[140],"survey":[141,162],"on":[142,165],"cryptographic":[144,167],"methods":[145,168,213],"their":[147],"operational":[148],"behavior":[149],"such":[150,174],"as":[151,175],"asymmetric":[152],"key":[153,158,186],"(AKC)":[155],"symmetric":[157],"(SKC).":[160],"This":[161],"mainly":[163],"focused":[164],"respect":[170],"attacks":[173,207],"forgery":[176],"chosen-cipher":[178],"text,":[179],"denial":[180],"service;":[182],"replay":[183],"man-in-the":[184],"middle,":[185],"reset,":[187],"device":[188],"capture":[189],"brute":[191],"force":[192],"attacks.":[193],"Hence,":[194],"lightweight":[196],"(LWC)":[198],"prominent":[201],"solution":[202],"mitigate":[204],"all":[205],"these":[206],"deep":[211],"learning":[212],"maintain":[216],"standards":[220],"lower":[223],"utilization":[225],"environment.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
