{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:43:16Z","timestamp":1726036996196},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030248994"},{"type":"electronic","value":"9783030249007"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24900-7_1","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T04:12:15Z","timestamp":1562731935000},"page":"5-19","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Ragab","sequence":"first","affiliation":[]},{"given":"Gamal","family":"Selim","sequence":"additional","affiliation":[]},{"given":"Abdelmoniem","family":"Wahdan","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Madani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Bhardwaj, S., Kole, A.: Review and study of the Internet of Things: it\u2019s the future. In: 2016 IEEE International Conference Intelligent Control Power and Instrumentation (ICICPI) (2016)","DOI":"10.1109\/ICICPI.2016.7859671"},{"key":"1_CR2","unstructured":"Demblewski, M.: Security Frameworks for Machine-to-Machine Devices and Networks. Ph.D. Thesis, Nova Southeastern University (2015). \n                      https:\/\/nsuworks.nova.edu\/cgi\/viewcontent.cgi?article=1068&context=gscis_etd\n                      \n                    . Accessed 10 Feb 2019"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali, B., Awad, A.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)","journal-title":"Sensors"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chandra, S., Paira, S., Alam, S., Sanya, G.: A comparative survey of symmetric and asymmetric key cryptography. In: International Conference on Electronics, Communication and Computational Engineering (ICECCE) (2014)","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"1_CR5","unstructured":"Kumar, Y., Munjal, R., Sharma, H.: Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int. J. Comput. Sci. Manag. Stud. 11(03), (2011)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Henriques, M., Vernekar, N.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: 2017 IEEE International Conference IoT and Application (ICIOT) (2017)","DOI":"10.1109\/ICIOTA.2017.8073643"},{"key":"1_CR7","unstructured":"Ruan, C., Luo, J.: Design and implementation of a mobile payment system for intelligent travel. In: 2014 IEEE 3rd International Conference Cloud Computing and Intelligence Systems (CCIS) (2014)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Xin, M.: A mixed encryption algorithm used in the Internet of Things security transmission system. In: 2015 IEEE International Conference Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (2015)","DOI":"10.1109\/CyberC.2015.9"},{"key":"1_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-981-10-1023-1_44","volume-title":"Advanced Computing and Communication Technologies","author":"K Biswas","year":"2016","unstructured":"Biswas, K., Muthukkumarasamy, V., Wu, X.-W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 443\u2013452. Springer, Singapore (2016). \n                      https:\/\/doi.org\/10.1007\/978-981-10-1023-1_44"},{"key":"1_CR10","unstructured":"Ekera, M.: Differential Cryptanalysis of MD5. Master of Science Thesis Stockholm, Sweden (2009)"},{"issue":"9","key":"1_CR11","first-page":"22","volume":"9","author":"S Kaur","year":"2017","unstructured":"Kaur, S., et al.: Study of multi-level cryptography algorithm: multi-prime RSA and DES. Int. J. Comput. Netw. Inf. Secur. 9(9), 22 (2017)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"1_CR12","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-319-44270-9_16","volume-title":"Multimedia Forensics and Security","author":"A Darwish","year":"2017","unstructured":"Darwish, A., El-Gendy, M.M., Hassanien, A.E.: A new hybrid cryptosystem for Internet of Things applications. In: Hassanien, A.E., Fouad, M.M., Manaf, A.A., Zamani, M., Ahmad, R., Kacprzyk, J. (eds.) Multimedia Forensics and Security. ISRL, vol. 115, pp. 365\u2013380. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-44270-9_16"},{"key":"1_CR13","unstructured":"Yarrkov, A.: Cryptanalysis of XXTEA, 4 May 2010. \n                      https:\/\/eprint.iacr.org\/2010\/254.pdf\n                      \n                    . Accessed 10 Feb 2019"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Bhaskar, C., Rupa, C.: An advanced symmetric block cipher based on chaotic systems. In: 2017 IEEE Innovations Power and Advanced Computing Technologies (i-PACT) (2017)","DOI":"10.1109\/IPACT.2017.8244891"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Yousefi, A., Jameii, S.: Improving the security of Internet of Things using encryption algorithms. In: 2017 IEEE International Conference IoT and Application (ICIOT) (2017)","DOI":"10.1109\/ICIOTA.2017.8073627"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Singh, S., Padhye, S.: Cryptanalysis of NTRU with n Public Keys. In: ISEA Asia Security and Privacy (ISEASP) (2017)","DOI":"10.1109\/ISEASP.2017.7976980"},{"key":"1_CR17","unstructured":"Khomlyak, O.: An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT (2017)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, A.: Password hashing status in molecular diversity preservation. MDPI Int. J. (2017)","DOI":"10.3390\/cryptography1020010"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Harini, A., et al.: A novel security mechanism using hybrid cryptography algorithms. In: 2017 IEEE International Conference Electrical Instrumentation and Communication Engineering (ICEICE) (2017)","DOI":"10.1109\/ICEICE.2017.8191910"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny, M., et al.: Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6, 20596\u201320608 (2018)","journal-title":"IEEE Access"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Njuki, S., et al.: An evaluation on securing cloud systems based on cryptographic key algorithms. In: Proceedings of the 2018 2nd International Conference on Algorithms, ACM Computing and Systems (2018)","DOI":"10.1145\/3242840.3242853"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Advances in cryptology-CRYPTO. In: 2005 Proceedings of The 25th Annual International Cryptology Conference, Santa Barbara, California, USA, 14\u201318 August, vol. 3621. Springer (2005)","DOI":"10.1007\/11535218"},{"issue":"1","key":"1_CR23","first-page":"40","volume":"8","author":"D Abdelminaam","year":"2018","unstructured":"Abdelminaam, D.: Improving the security of cloud computing by building new hybrid cryptography algorithms. J. Electron. Inf. Eng. 8(1), 40\u201348 (2018)","journal-title":"J. Electron. Inf. Eng."},{"key":"1_CR24","unstructured":"Sagar, F.: Cryptographic Hashing Functions - MD5, September 2016. \n                      http:\/\/cs.indstate.edu\/~fsagar\/doc\/paper.pdf\n                      \n                    . Accessed 20 Apr (2019)"},{"issue":"4","key":"1_CR25","first-page":"130","volume":"9","author":"A Habboush","year":"2018","unstructured":"Habboush, A.: Multi-level encryption framework. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 9(4), 130\u2013134 (2018)","journal-title":"(IJACSA) Int. J. Adv. Comput. Sci. Appl."},{"key":"1_CR26","unstructured":"Mahto, D., Khan, D., Yadav, D.: Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the World Congress on Engineering 2016, WCE 2016, 29 June\u20131 June 2016, London, U.K, vol. I (2016)"},{"key":"1_CR27","unstructured":"Ragab, A.: Robust hybrid cryptosystem for protecting smart devices in Internet of Things (IoT), Master thesis, record number 14120399, Dept. of Computer Engineering, Arab Academy for Science, Technology and Maritime Transport, Cairo, Egypt (2019)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Bhasher, U., Rupa, C.: An advanced symmetric block cipher based on chaotic systems. In: IEEE International Conference on Innovations in Power and Advanced Computing Technologies (2017)","DOI":"10.1109\/IPACT.2017.8244891"},{"key":"1_CR29","unstructured":"Libelium-Techedge: Smart Industrial Protocols Solution Kit. \n                      https:\/\/www.the-iot-marketplace.com\/libelium-techedge-smart-industrial-protocols-solution-kit\n                      \n                    . Accessed 10 Feb 2019"},{"key":"1_CR30","unstructured":"AWS IoT Device Defender: Security management for IoT devices. \n                      https:\/\/aws.amazon.com\/iot-device-defender\/?nc=sn&loc=2&dn=5\n                      \n                    . Accessed 20 Apr 2019"},{"key":"1_CR31","unstructured":"Security on arm. \n                      https:\/\/developer.arm.com\/technologies\/security-on-arm\n                      \n                    . Accessed 20 Apr 2019"},{"key":"1_CR32","unstructured":"Wheeler, D., Needham, R.: Correction to XTEA. Computer Laboratory, Cambridge University, England (1998)"},{"key":"1_CR33","unstructured":"Andem, V.: A cryptanalysis of the tiny encryption algorithm, Master thesis, Department of Computer Science in the Graduate School of The University of Alabama (2003)"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). \n                      https:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Kaur, S., Bharadwaj, P., Mankotia, S.: Study of multi-level cryptography algorithm: multi-prime RSA and DES. Modern Education and Computer Science (MECS) Press (2017)","DOI":"10.5815\/ijcnis.2017.09.03"},{"key":"1_CR36","unstructured":"Barker, E., Dang, Q.: Recommendation for key management. NIST Special Publication 800-57 Part-3 Revision 1, National Institute of Standards and Technology (NIST), January 2015"},{"key":"1_CR37","unstructured":"Percival, C.: Stronger key derivation via sequential memory-hard functions, pp 1\u201316 (2009)"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-77026-8_8","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"O Dunkelman","year":"2007","unstructured":"Dunkelman, O., Sekar, G., Preneel, B.: Improved meet-in-the-middle attacks on reduced-round DES. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 86\u2013100. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-77026-8_8"},{"key":"1_CR39","volume-title":"Applied Cryptanalysis: Breaking Ciphers in the Real World","author":"M Stamp","year":"2017","unstructured":"Stamp, M., Low, R.: Applied Cryptanalysis: Breaking Ciphers in the Real World. Wiley, Hoboken (2017)"},{"key":"1_CR40","doi-asserted-by":"publisher","first-page":"3868","DOI":"10.3390\/s18113868","volume":"18","author":"M Albela","year":"2018","unstructured":"Albela, M., Lamas, P., Caram\u00e9s, T.: A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors 18, 3868 (2018)","journal-title":"Sensors"},{"key":"1_CR41","unstructured":"Ertaul, L., Kaur, M., Gudise, V.: Implementation and performance analysis of PBKDF2, Bcrypt, Scrypt algorithms. In: Proceedings of the International Conference on Wireless Networks (ICWN), Athens, pp. 66\u201372. Athens (2016)"},{"key":"1_CR42","doi-asserted-by":"publisher","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"S Rajesh","year":"2019","unstructured":"Rajesh, S., Paul, V., Menon, V., Khosravi, M.: A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11, 293 (2019)","journal-title":"Symmetry"},{"key":"1_CR43","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-981-13-2414-7_27","volume-title":"Smart Innovations in Communication and Computational Sciences","author":"A Shah","year":"2019","unstructured":"Shah, A., Engineer, M.: A survey of lightweight cryptographic algorithms for IoT-based applications. In: Tiwari, S., Trivedi, M.C., Mishra, K.K., Misra, A.K., Kumar, K.K. (eds.) Smart Innovations in Communication and Computational Sciences. AISC, vol. 851, pp. 283\u2013293. Springer, Singapore (2019). \n                      https:\/\/doi.org\/10.1007\/978-981-13-2414-7_27\n                      \n                    . Accessed 20 Apr 2019"},{"key":"1_CR44","unstructured":"Percival, C.: Stronger key derivation via sequential memory-hard functions. \n                      https:\/\/www.tarsnap.com\/scrypt\/scrypt.pdf\n                      \n                    . Accessed 20 Apr 2019"},{"issue":"5","key":"1_CR45","first-page":"2258","volume":"13","author":"D Sehrawat","year":"2018","unstructured":"Sehrawat, D., Nasib Gill, N.: Lightweight block ciphers for IoT based applications: a review. Int. J. Appl. Eng. Res. 13(5), 2258\u20132270 (2018). ISSN 0973-4562","journal-title":"Int. J. Appl. Eng. Res."},{"key":"1_CR46","unstructured":"Dinu, D.: Efficient and secure implementations of lightweight symmetric cryptographic primitives. Ph.D. Dissertation, Luxembourg University (2017) \n                      https:\/\/zdoc.pub\/2017-in-luxembourg-to-obtain-the-degree-of.html\n                      \n                    . Accessed 20 Apr 2019"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"35966","DOI":"10.1109\/ACCESS.2018.2848586","volume":"6","author":"B Mohd","year":"2018","unstructured":"Mohd, B., Hayajneh, T.: Lightweight block ciphers for IoT: energy optimization and survivability techniques. IEEE Access 6, 35966\u201335978 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24900-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T04:20:13Z","timestamp":1562732413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24900-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030248994","9783030249007"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24900-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}