{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:09:00Z","timestamp":1772118540439,"version":"3.50.1"},"reference-count":17,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The resource\u2010constrained characteristics of the Internet of Things (IoT) sensors lead to a pressing security requirement for developing lightweight cryptographic algorithms. This work introduces and analyzes a novel lightweight cryptographic algorithm for resource\u2010constrained devices. The algorithm is based on the Feistel structure in which the round function combines circular shifts, XOR, and key addition operation for data encryption and decryption. With a key size of 128 bits and a block size of 64 bits, the algorithm employs Linear Feedback Shift Registers (LFSR) for key generation. The algorithm's security is evaluated by examining its adherence to the avalanche criterion, a critical property for robust encryption. A comprehensive comparison is made between the proposed algorithm and a previously developed lightweight encryption algorithm, which also utilized LFSR for key generation in terms of avalanche effect, execution time and energy consumption. The proposed cipher is found to be significantly faster with an encryption time of 88 microseconds on Android Uno. The proposed cipher is also faster and consumed less energy in ESP 32, STM Nucleo, and Android Nano.<\/jats:p>","DOI":"10.1002\/itl2.613","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T18:44:48Z","timestamp":1732819488000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["<scp>LiteEncrypt<\/scp>\n                    : A Lightweight Block Cipher for Secure Communication in\n                    <scp>IoT<\/scp>\n                    Enabled Sensor"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-069X","authenticated-orcid":false,"given":"Rashmi","family":"Sahay","sequence":"first","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, Faculty of Science and Technology, IcfaiTech The ICFAI Foundation for Higher Education  Hyderabad India"}]},{"given":"Lingutla","family":"Lakshmi","sequence":"additional","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, Faculty of Science and Technology, IcfaiTech The ICFAI Foundation for Higher Education  Hyderabad India"}]},{"given":"Zion","family":"Dodhiawala","sequence":"additional","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, Faculty of Science and Technology, IcfaiTech The ICFAI Foundation for Higher Education  Hyderabad India"}]}],"member":"311","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"e_1_2_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"e_1_2_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s24124008"},{"key":"e_1_2_2_7_4_1","doi-asserted-by":"crossref","unstructured":"V.Voloshyn M. S.Khan G.Srivastava andM.Darshan \u201cAnalysis of NIST Lightweight Cryptographic Algorithms Performance in IoT Security Environments Based on MQTT \u201din\u20092024 IEEE Wireless Communications and Networking Conference(WCNC)\u2009(IEEE \u20092024) \u20091\u20136.","DOI":"10.1109\/WCNC57260.2024.10571199"},{"key":"e_1_2_2_7_5_1","doi-asserted-by":"crossref","unstructured":"C.Rahul N.Kousarr T. A.Yadav P.Keerthi S.Hariharan andV.Kukreja \u201cAnalysis of Resource Utilization in Lightweight Cryptographic Algorithms \u201din\u20092024 International Conference on Cognitive Robotics and Intelligent Systems(ICC\u2010ROBINS)\u2009(IEEE \u20092024) \u2009884\u2013889.","DOI":"10.1109\/ICC-ROBINS60238.2024.10533998"},{"key":"e_1_2_2_7_6_1","first-page":"139","volume-title":"InInternational Conference on Human\u2010Centric Smart Computing","author":"Alahdal A.","year":"2023"},{"key":"e_1_2_2_7_7_1","doi-asserted-by":"crossref","unstructured":"R.Wu G.Tian L.Ma Z.Li andS.Liu \u201cLightweight Cryptography Implementation for Internet of Things Network on FPGA \u201din\u20092023 IEEE International Conference on Systems Man and Cybernetics(SMC)\u2009(IEEE \u20092023) \u20093027\u20133032.","DOI":"10.1109\/SMC53992.2023.10394345"},{"key":"e_1_2_2_7_8_1","doi-asserted-by":"crossref","unstructured":"S.ThariniandR.Sudhakar \u201cAn Enhanced Side Channel Secured PRESENT Light Weight Cipher for Smart Devices \u201din\u20092023 3rd International Conference on Pervasive Computing and Social Networking(ICPCSN)\u2009(IEEE \u20092023) \u2009620\u2013628.","DOI":"10.1109\/ICPCSN58827.2023.00109"},{"key":"e_1_2_2_7_9_1","doi-asserted-by":"crossref","unstructured":"G. A.Nikitha G. J.Kathrine C. R.Duthie V.Ebenezer andS.Silas \u201cHybrid Cryptographic Algorithm to Secure Internet of Things \u201din\u20092023 7th International Conference on Intelligent Computing and Control Systems(ICICCS)\u2009(IEEE \u20092023) \u20091556\u20131562.","DOI":"10.1109\/ICICCS56967.2023.10142709"},{"key":"e_1_2_2_7_10_1","doi-asserted-by":"crossref","unstructured":"A.Dwivedi R.Agarwal andP. K.Shukla \u201cPost\u2010Quantum Lightweight Encryption Algorithm for Internet of Things Devices \u201din\u20092023 Second International Conference on Electrical Electronics Information and Communication Technologies(ICEEICT)\u2009(IEEE \u20092023) \u20091\u20138.","DOI":"10.1109\/ICEEICT56924.2023.10157055"},{"issue":"1","key":"e_1_2_2_7_11_1","article-title":"Small but Mighty: The Power of Lightweight Cryptography in IoT","volume":"3","author":"Srinivas T. A.","year":"2023","journal-title":"International Journal of Advanced Research in Science, Communication and Technology"},{"key":"e_1_2_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13074398"},{"key":"e_1_2_2_7_13_1","doi-asserted-by":"crossref","unstructured":"G.Murtaza F.Iqbal A.Altaf andA.Rasheed \u201cTechniques for Resource\u2010Efficient Lightweight Cryptography in IoT Devices for Smart Environment \u201din\u20092023 Sixth International Conference of Women in Data Science at Prince Sultan University(WiDS PSU)\u2009(IEEE \u20092023) \u2009223\u2013228.","DOI":"10.1109\/WiDS-PSU57071.2023.00053"},{"key":"e_1_2_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.25271\/sjuoz.2023.11.3.1055"},{"key":"e_1_2_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020405"},{"key":"e_1_2_2_7_16_1","doi-asserted-by":"crossref","unstructured":"M.Usman I.Ahmed M. I.Aslam S.Khan andU. A.Shah \u201cSIT: A Lightweight Encryption Algorithm for Secure Internet of Things \u201darXiv preprint arXiv:1704.08688 (2017).","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"e_1_2_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"e_1_2_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_4"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:25:12Z","timestamp":1761071112000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10.1002\/itl2.613"],"URL":"https:\/\/doi.org\/10.1002\/itl2.613","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.613\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.613\/v1\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.613\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.613\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.613\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.613\/v2\/review1","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"2024-09-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e613"}}