{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:22:48Z","timestamp":1773199368649,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030691424","type":"print"},{"value":"9783030691431","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69143-1_34","type":"book-chapter","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T04:03:56Z","timestamp":1613275436000},"page":"444-456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["An Efficient Lightweight Cryptographic Algorithm for IoT Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4568-7566","authenticated-orcid":false,"given":"Muyideen","family":"Abdulraheem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-4432","authenticated-orcid":false,"given":"Joseph Bamidele","family":"Awotunde","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1468-8884","authenticated-orcid":false,"given":"Rasheed Gbenga","family":"Jimoh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1472-2237","authenticated-orcid":false,"given":"Idowu Dauda","family":"Oladipo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,14]]},"reference":[{"issue":"2","key":"34_CR1","doi-asserted-by":"publisher","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"S Rajesh","year":"2019","unstructured":"Rajesh, S., Paul, V., Menon, V.G., Khosravi, M.R.: A secure and efficient lightweight symmetric encryption scheme for the transfer of text files between embedded IoT devices. Symmetry 11(2), 293 (2019)","journal-title":"Symmetry"},{"key":"34_CR2","doi-asserted-by":"publisher","unstructured":"Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Human. Comput. 1\u201318 (2017). https:\/\/doi.org\/10.1007\/s12652-017-0494-4","DOI":"10.1007\/s12652-017-0494-4"},{"issue":"23","key":"34_CR3","doi-asserted-by":"publisher","first-page":"32633","DOI":"10.1007\/s11042-018-6801-z","volume":"78","author":"N Alassaf","year":"2019","unstructured":"Alassaf, N., Gutub, A., Parah, S.A., Al Ghamdi, M.: Enhancing the speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools Appl. 78(23), 32633\u201332657 (2019)","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/COMST.2018.2849509","volume":"20","author":"P Porambage","year":"2018","unstructured":"Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for the internet of things realization. IEEE Commun. Surv. Tutorials 20(4), 2961\u20132991 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/IOTM.2018.1700021","volume":"1","author":"J Ploennigs","year":"2018","unstructured":"Ploennigs, J., Cohn, J., Stanford-Clark, A.: The future of IoT. IEEE Internet Things Mag. 1(1), 28\u201333 (2018)","journal-title":"IEEE Internet Things Mag."},{"issue":"1","key":"34_CR6","first-page":"248","volume":"15","author":"V Philip","year":"2017","unstructured":"Philip, V., Suman, V.K., Menon, V.G., Dhanya, K.A.: A review on the latest internet of things based on healthcare applications. Int. J. Comput. Sci. Inf. Secur. 15(1), 248 (2017)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"issue":"1","key":"34_CR7","first-page":"13","volume":"8","author":"S Deshkar","year":"2017","unstructured":"Deshkar, S., Thanseeh, R.A., Menon, V.G.: A review of IoT based m-Health systems for diabetes. Int. J. Comput. Sci. Telecommun. 8(1), 13\u201318 (2017)","journal-title":"Int. J. Comput. Sci. Telecommun."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Fink, G.A., Zarzhitsky, D.V., Carroll, T.E., Farquhar, E.D.: Security and privacy grand challenges for the Internet of Things. In: 2015 International Conference on Collaboration Technologies and Systems (CTS), pp. 27\u201334. IEEE, June 2015.","DOI":"10.1109\/CTS.2015.7210391"},{"issue":"3","key":"34_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.dcan.2017.10.002","volume":"4","author":"MS Mahdavinejad","year":"2018","unstructured":"Mahdavinejad, M.S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., Sheth, A.P.: Machine learning for Internet of Things data analysis: a survey. Digital Commun. Netw. 4(3), 161\u2013175 (2018)","journal-title":"Digital Commun. Netw."},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"47472","DOI":"10.1109\/ACCESS.2018.2866185","volume":"6","author":"B Bordel","year":"2018","unstructured":"Bordel, B., Alcarria, R., De Andr\u00e9s, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472\u201347488 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"34_CR11","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2017","unstructured":"Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483\u20132495 (2017)","journal-title":"IEEE Internet Things J."},{"key":"34_CR12","first-page":"255","volume":"34","author":"PK Dhillon","year":"2017","unstructured":"Dhillon, P.K., Kalra, S.: A lightweight biometrics-based remote user authentication scheme for IoT services. J. Inf. Secur. Appl. 34, 255\u2013270 (2017)","journal-title":"J. Inf. Secur. Appl."},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif, A., Arshad, H., Nikooghadam, M., Abbasinezhad-Mood, D.: Three party secure data transmission in IoT networks through the design of a lightweight authenticated key agreement scheme. Future Generation Comput. Syst. 100, 882\u2013892 (2019)","journal-title":"Future Generation Comput. Syst."},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"101194","DOI":"10.1016\/j.pmcj.2020.101194","volume":"67","author":"S Rostampour","year":"2020","unstructured":"Rostampour, S., Safkhani, M., Bendavid, Y., Bagheri, N.: ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob. Comput. 67, 101194 (2020)","journal-title":"Pervasive Mob. Comput."},{"issue":"6","key":"34_CR15","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/TIFS.2018.2790916","volume":"13","author":"B Wang","year":"2018","unstructured":"Wang, B., Zhan, Y., Zhang, Z.: Cryptanalysis of the asymmetric fully homomorphic encryption scheme. IEEE Trans. Inf. Forensics Secur. 13(6), 1460\u20131467 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"21","key":"34_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i21\/95293","volume":"9","author":"ND Jambhekar","year":"2016","unstructured":"Jambhekar, N.D., Misra, S., Dhawale, C.A.: Cloud computing security with collaborating encryption. Indian J. Sci. Technol 9(21), 1\u20137 (2016)","journal-title":"Indian J. Sci. Technol"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: A comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 International Conference on Engineering and Technology (ICET),\u00a0pp. 1\u20137. IEEE, August 2017","DOI":"10.1109\/ICEngTechnol.2017.8308215"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Alam, K.M.R., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In:\u00a02015 International Conference on Networking Systems and Security (NSysS),\u00a0pp. 1\u20135. IEEE, January 2015.","DOI":"10.1109\/NSysS.2015.7043532"},{"issue":"8","key":"34_CR19","doi-asserted-by":"publisher","first-page":"6183","DOI":"10.1007\/s13369-020-04524-4","volume":"45","author":"OT Arogundade","year":"2020","unstructured":"Arogundade, O.T., Abayomi-Alli, A., Misra, S.: An ontology-based security risk management model for information systems. Arabian J. Sci. Eng. 45(8), 6183\u20136198 (2020). https:\/\/doi.org\/10.1007\/s13369-020-04524-4","journal-title":"Arabian J. Sci. Eng."},{"key":"34_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-030-30275-7_19","volume-title":"Information and Software Technologies","author":"O Osho","year":"2019","unstructured":"Osho, O., Musa, F.A., Misra, S., Uduimoh, A.A., Adewunmi, A., Ahuja, R.: AbsoluteSecure: a tri-layered data security system. In: Dama\u0161evi\u010dius, R., Vasiljevien\u0117, G. (eds.) ICIST 2019. CCIS, vol. 1078, pp. 243\u2013255. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30275-7_19"},{"key":"34_CR21","unstructured":"Tripathy, B.K., Anuradha, J. (Eds.)\u00a0Internet of Things (IoT): Technologies, Applications, Challenges, and Solutions. CRC Press, Boca Raton (2017)."},{"key":"34_CR22","unstructured":"G\u00fcrses, S., Berendt, B., Santen, T.: Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In:\u00a0Proceedings of the UKDU Workshop, pp. 51\u201364 (2006)."},{"key":"34_CR23","doi-asserted-by":"publisher","DOI":"10.4337\/9781788970594.00008","volume-title":"The origins and development of the right to privacy","author":"J Campbell","year":"2020","unstructured":"Campbell, J.: The origins and development of the right to privacy. Edward Elgar Publishing, In Comparative Privacy and Defamation (2020)"},{"issue":"1","key":"34_CR24","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R.H.: Internet of Things-New security and privacy challenges. Computer law security review 26(1), 23\u201330 (2010)","journal-title":"Computer law security review"},{"issue":"15\u201316","key":"34_CR25","doi-asserted-by":"publisher","first-page":"4719","DOI":"10.1080\/00207543.2017.1402140","volume":"57","author":"M Ben-Daya","year":"2019","unstructured":"Ben-Daya, M., Hassini, E., Bahroun, Z.: Internet of things and supply chain management: a literature review. Int. J. Prod. Res. 57(15\u201316), 4719\u20134742 (2019)","journal-title":"Int. J. Prod. Res."},{"issue":"6","key":"34_CR26","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1111\/1468-2427.12916","volume":"44","author":"M Grubbauer","year":"2020","unstructured":"Grubbauer, M.: Assisted self-help housing in mexico: advocacy, (micro) finance, and the making of markets. Int. J. Urban Reg. Res. 44(6), 947\u2013966 (2020)","journal-title":"Int. J. Urban Reg. Res."},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Fabian, B., Gunther, O.: Distributed ONS and its privacy impact. In: 2007 IEEE International Conference on Communications,\u00a0pp. 1223\u20131228. IEEE, June 2007","DOI":"10.1109\/ICC.2007.207"},{"key":"34_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","volume":"144","author":"A \u010colakovi\u0107","year":"2018","unstructured":"\u010colakovi\u0107, A., Had\u017eiali\u0107, M.: Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17\u201339 (2018)","journal-title":"Comput. Netw."},{"key":"34_CR29","doi-asserted-by":"publisher","first-page":"27443","DOI":"10.1109\/ACCESS.2019.2900957","volume":"7","author":"M Malik","year":"2019","unstructured":"Malik, M., Dutta, M., Granjal, J.: A survey of key bootstrapping protocols based on public-key cryptography in the Internet of Things. IEEE Access 7, 27443\u201327464 (2019)","journal-title":"IEEE Access"},{"key":"34_CR30","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.future.2019.01.026","volume":"96","author":"W Jiang","year":"2019","unstructured":"Jiang, W., Li, H., Xu, G., Wen, M., Dong, G., Lin, X.: PTAS: privacy-preserving thin-client authentication scheme in blockchain-based PKI. Future Generation Comput. Syst. 96, 185\u2013195 (2019)","journal-title":"Future Generation Comput. Syst."},{"key":"34_CR31","doi-asserted-by":"publisher","first-page":"102630","DOI":"10.1016\/j.jnca.2020.102630","volume":"161","author":"SM Tahsien","year":"2020","unstructured":"Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning-based solutions for the security of the Internet of Things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"34_CR32","doi-asserted-by":"publisher","first-page":"101105","DOI":"10.1016\/j.pmcj.2019.101105","volume":"61","author":"F De Rango","year":"2020","unstructured":"De Rango, F., Potrino, G., Tropea, M., Fazio, P.: Energy-aware dynamic Internet of a Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks. Pervasive Mob. Comput. 61, 101105 (2020)","journal-title":"Pervasive Mob. Comput."},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Chakraborty, R.: A modified lightweight PRESENT cipher For IoT security. In:\u00a02020 International Conference on Computer Science, Engineering and Applications (ICCSEA),\u00a0pp. 1\u20136. IEEE, March 2020","DOI":"10.1109\/ICCSEA49143.2020.9132950"},{"issue":"1","key":"34_CR34","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/s19010021","volume":"19","author":"F Wu","year":"2019","unstructured":"Wu, F., Wu, T., Yuce, M.R.: An internet-of-things (IoT) network system for connected efficiency and health monitoring applications. Sensors 19(1), 21 (2019)","journal-title":"Sensors"},{"key":"34_CR35","unstructured":"Odun-Ayo, I., Misra, S., Omoregbe, N.A., Onibere, E., Bulama, Y., Damasevicius, R.: Cloud-based security driven human resource management system. In: ICADIWT, pp. 96\u2013106, March 2017"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69143-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T11:03:17Z","timestamp":1619262197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-69143-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030691424","9783030691431"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69143-1_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communication Technology and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Minna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nigeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icta12020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictafutminna.com.ng\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"166","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}