{"id":"https://openalex.org/W2889123521","doi":"https://doi.org/10.1145/3231053.3231100","title":"A review of data security and cryptographic techniques in IoT based devices","display_name":"A review of data security and cryptographic techniques in IoT based devices","publication_year":2018,"publication_date":"2018-06-26","ids":{"openalex":"https://openalex.org/W2889123521","doi":"https://doi.org/10.1145/3231053.3231100","mag":"2889123521"},"language":"en","primary_location":{"id":"doi:10.1145/3231053.3231100","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3231053.3231100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024801876","display_name":"Ghulam Mustafa","orcid":"https://orcid.org/0000-0001-5521-9921"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Ghulam Mustafa","raw_affiliation_strings":["National textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082741707","display_name":"Rehan Ashraf","orcid":"https://orcid.org/0000-0003-0893-4791"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Rehan Ashraf","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081779996","display_name":"Muhammad Ayzed Mirza","orcid":"https://orcid.org/0000-0003-3176-2764"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Ayzed Mirza","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059900651","display_name":"Abid Jamil","orcid":null},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Abid Jamil","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100728840","display_name":"Muhammad","orcid":null},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024801876"],"corresponding_institution_ids":["https://openalex.org/I505182"],"apc_list":null,"apc_paid":null,"fwci":3.6906,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.93765442,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.819452166557312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7823916077613831},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7358571290969849},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5364440679550171},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5347458720207214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5188844799995422},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4620034396648407},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4546724259853363},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4545213580131531},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4475364685058594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33532005548477173},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.32367777824401855},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11999839544296265},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09963220357894897},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0957571268081665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819452166557312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7823916077613831},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7358571290969849},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5364440679550171},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5347458720207214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5188844799995422},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4620034396648407},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4546724259853363},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4545213580131531},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4475364685058594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33532005548477173},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.32367777824401855},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11999839544296265},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09963220357894897},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0957571268081665}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3231053.3231100","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3231053.3231100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W329543548","https://openalex.org/W2116286374","https://openalex.org/W2152048468","https://openalex.org/W2389214518","https://openalex.org/W2504743195","https://openalex.org/W2577832918","https://openalex.org/W2580751378","https://openalex.org/W2585696635","https://openalex.org/W2595218351","https://openalex.org/W2611607691","https://openalex.org/W2618453982","https://openalex.org/W2735385107","https://openalex.org/W2752377507","https://openalex.org/W2766551086","https://openalex.org/W2777277266","https://openalex.org/W2796163979","https://openalex.org/W2806693926","https://openalex.org/W3082976790","https://openalex.org/W3101352484","https://openalex.org/W6740945748"],"related_works":["https://openalex.org/W1988191063","https://openalex.org/W3207844197","https://openalex.org/W4300978562","https://openalex.org/W4212936411","https://openalex.org/W2757819956","https://openalex.org/W3200904625","https://openalex.org/W4211089566","https://openalex.org/W3123910338","https://openalex.org/W4210732556","https://openalex.org/W2330894374"],"abstract_inverted_index":{"The":[0,83],"idea":[1],"of":[2,5,26,67,85,205],"the":[3,17,24,46,51,54,95,108,158,161,165,180,185],"Internet":[4,47],"Things":[6],"(IoT)":[7],"is":[8,41,60,69,88],"to":[9,14,16,28,36,43,45,132],"connect":[10,44],"or":[11,198],"give":[12],"access":[13],"everything":[15,40],"Internet.":[18,162],"IoT":[19,96,127,138,148,212],"environment":[20],"not":[21,124],"only":[22],"provides":[23,202],"facility":[25],"Human":[27],"Machine":[29,35,37],"connectivity,":[30],"however,":[31],"it":[32,189],"also":[33,49],"creates":[34],"connectivity.":[38],"As":[39,91],"going":[42],"and":[48,80,103,107,115,143,151,171],"generating":[50,56],"data.":[52],"So,":[53,129],"data":[55,68,74,87,145,159,166,186],"by":[57,167,179,187],"these":[58],"devices":[59,97,139],"growing":[61],"up":[62],"rapidly,":[63],"that":[64,175],"huge":[65,76],"amount":[66],"called":[70],"Big":[71],"Data.":[72],"This":[73,200],"has":[75],"Volume,":[77],"High":[78],"Velocity,":[79],"different":[81],"Variety.":[82],"security":[84],"this":[86],"a":[89,169,173,203],"risk.":[90],"we":[92,130],"know":[93],"that,":[94],"have":[98],"constraints":[99],"like":[100,112,193],"low":[101],"power":[102],"less":[104],"computational":[105],"speed":[106],"traditional":[109],"encryption":[110,121,135],"algorithms":[111],"DES,":[113],"3DES,":[114],"AES":[116],"are":[117,154],"more":[118],"complex.":[119],"Traditional":[120],"algorithm":[122,136],"seems":[123],"feasible":[125],"for":[126,137,140,156,211],"devices.":[128,213],"need":[131],"develop":[133],"Lightweight":[134],"secure":[141,144],"communication":[142],"transmission":[146],"in":[147],"environment.":[149],"Cryptography":[150,163],"Steganography":[152,183],"techniques":[153,209],"used":[155,210],"securing":[157],"over":[160],"encrypts":[164],"using":[168],"key":[170],"make":[172],"ciphertext":[174],"cannot":[176],"be":[177],"readable":[178],"normal":[181],"user.":[182],"hides":[184],"concealing":[188],"into":[190],"another":[191],"medium":[192],"data,":[194],"image,":[195],"audio,":[196],"video,":[197],"mixed.":[199],"paper":[201],"review":[204],"important":[206],"lightweight":[207],"cryptographic":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
