{"id":"https://openalex.org/W3003952334","doi":"https://doi.org/10.1145/3360774.3368202","title":"Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device","display_name":"Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device","publication_year":2019,"publication_date":"2019-11-12","ids":{"openalex":"https://openalex.org/W3003952334","doi":"https://doi.org/10.1145/3360774.3368202","mag":"3003952334"},"language":"en","primary_location":{"id":"doi:10.1145/3360774.3368202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360774.3368202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038726310","display_name":"Brandon Tsao","orcid":null},"institutions":[{"id":"https://openalex.org/I16269868","display_name":"Santa Clara University","ror":"https://ror.org/03ypqe447","country_code":"US","type":"education","lineage":["https://openalex.org/I16269868"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brandon Tsao","raw_affiliation_strings":["Santa Clara University"],"affiliations":[{"raw_affiliation_string":"Santa Clara University","institution_ids":["https://openalex.org/I16269868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100324600","display_name":"Yuhong Liu","orcid":"https://orcid.org/0000-0002-3717-427X"},"institutions":[{"id":"https://openalex.org/I16269868","display_name":"Santa Clara University","ror":"https://ror.org/03ypqe447","country_code":"US","type":"education","lineage":["https://openalex.org/I16269868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuhong Liu","raw_affiliation_strings":["Santa Clara University"],"affiliations":[{"raw_affiliation_string":"Santa Clara University","institution_ids":["https://openalex.org/I16269868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040461963","display_name":"Behnam Dezfouli","orcid":"https://orcid.org/0000-0001-6090-0412"},"institutions":[{"id":"https://openalex.org/I16269868","display_name":"Santa Clara University","ror":"https://ror.org/03ypqe447","country_code":"US","type":"education","lineage":["https://openalex.org/I16269868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Behnam Dezfouli","raw_affiliation_strings":["Santa Clara University"],"affiliations":[{"raw_affiliation_string":"Santa Clara University","institution_ids":["https://openalex.org/I16269868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038726310"],"corresponding_institution_ids":["https://openalex.org/I16269868"],"apc_list":null,"apc_paid":null,"fwci":0.4334,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.73597964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"483","last_page":"491"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8019100427627563},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7553442120552063},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6436277031898499},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.6334248781204224},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6056494116783142},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5963348746299744},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5137813687324524},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.489507794380188},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3765206038951874},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.255010187625885},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19446909427642822},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1006610095500946}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8019100427627563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7553442120552063},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6436277031898499},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.6334248781204224},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6056494116783142},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5963348746299744},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5137813687324524},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.489507794380188},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3765206038951874},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.255010187625885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19446909427642822},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1006610095500946},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3360774.3368202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360774.3368202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarcommons.scu.edu:cseng_mstr-1012","is_oa":false,"landing_page_url":"https://scholarcommons.scu.edu/cseng_mstr/13","pdf_url":null,"source":{"id":"https://openalex.org/S4377196452","display_name":"Scholar Commons (Santa Clara University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16269868","host_organization_name":"Santa Clara University","host_organization_lineage":["https://openalex.org/I16269868"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Master's Theses","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W110458095","https://openalex.org/W1527701244","https://openalex.org/W1556212265","https://openalex.org/W1606518234","https://openalex.org/W1988037376","https://openalex.org/W2102890180","https://openalex.org/W2125555950","https://openalex.org/W2163354454","https://openalex.org/W2733765803"],"related_works":["https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W2388259026","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2913264063","https://openalex.org/W2768869846","https://openalex.org/W648677723","https://openalex.org/W2951531469","https://openalex.org/W1585813234"],"abstract_inverted_index":{"With":[0],"the":[1,6,32,91,94],"proliferation":[2],"of":[3,8,34,61],"IoT,":[4],"securing":[5],"abundance":[7],"devices":[9,79],"is":[10],"critical.":[11],"The":[12],"current":[13],"IoT":[14,42],"and":[15,48,51,66,93,99],"security":[16],"landscapes":[17],"lack":[18],"empirical":[19],"evidence":[20],"on":[21,39,55],"algorithms":[22,38,74,87],"optimized":[23,86],"for":[24,77],"constrained":[25,78],"devices.":[26],"In":[27],"this":[28],"paper,":[29],"we":[30,72],"study":[31],"performance":[33],"various":[35],"symmetric":[36,57],"encryption":[37,47,58,98],"a":[40],"Contiki-based":[41],"device.":[43],"This":[44],"paper":[45],"provides":[46],"decryption":[49],"durations":[50],"energy":[52,92],"consumption":[53],"results":[54],"three":[56],"algorithm":[59],"implementations":[60],"AES":[62],"(tinyAES,":[63],"B-Con's":[64],"AES,":[65],"Contiki's":[67],"own":[68],"built-in":[69],"AES),":[70],"where":[71],"found":[73],"specifically":[75],"built":[76],"fared":[80],"much":[81],"better":[82],"than":[83],"those":[84],"not,":[85],"using":[88],"about":[89],"0.16":[90],"time":[95],"to":[96],"perform":[97],"decryption.":[100]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
