{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:27:07Z","timestamp":1770546427561,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T00:00:00Z","timestamp":1644192000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T00:00:00Z","timestamp":1644192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-022-04322-9","type":"journal-article","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T12:03:01Z","timestamp":1644235381000},"page":"11111-11137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1061-2997","authenticated-orcid":false,"given":"A. O.","family":"Bang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2372-4138","authenticated-orcid":false,"given":"Udai Pratap","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,7]]},"reference":[{"issue":"7","key":"4322_CR1","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton K et al (2009) That internet of things thing. RFID J 22(7):97\u2013114","journal-title":"RFID J"},{"issue":"1","key":"4322_CR2","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s11277-019-06407-w","volume":"108","author":"S Balaji","year":"2019","unstructured":"Balaji S, Nathani K, Santhakumar R (2019) Iot technology, applications and challenges: a contemporary survey. Wireless Pers Commun 108(1):363\u2013388","journal-title":"Wireless Pers Commun"},{"key":"4322_CR3","doi-asserted-by":"crossref","unstructured":"Sharma N, Shamkuwar M, Singh I (2019) The history, present and future with iot. In: Internet of things and big data analytics for smart generation. Springer, pp 27\u201351","DOI":"10.1007\/978-3-030-04203-5_3"},{"key":"4322_CR4","doi-asserted-by":"crossref","unstructured":"Bang AO, Rao UP (2021) Context-aware computing for iot: history, applications and research challenges. In: Proceedings of second international conference on smart energy and communication. Springer, pp 719\u2013726","DOI":"10.1007\/978-981-15-6707-0_70"},{"key":"4322_CR5","doi-asserted-by":"crossref","unstructured":"Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology. IEEE, pp 257\u2013260","DOI":"10.1109\/FIT.2012.53"},{"key":"4322_CR6","doi-asserted-by":"publisher","unstructured":"Bang AO, Rao UP (2021) A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03816-2","DOI":"10.1007\/s11227-021-03816-2"},{"issue":"4","key":"4322_CR7","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"key":"4322_CR8","unstructured":"Sanfelix E, de Haas J, Mune C (2015) Unboxing the white-box: practical attacks against obfuscated ciphers. Presentation at blackhat Europe"},{"issue":"5","key":"4322_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2016.100","volume":"14","author":"M Beunardeau","year":"2016","unstructured":"Beunardeau M, Connolly A, Geraud R, Naccache D (2016) White-box cryptography: security in an insecure environment. IEEE Secur Priv 14(5):88\u201392","journal-title":"IEEE Secur Priv"},{"key":"4322_CR10","doi-asserted-by":"crossref","unstructured":"Shi Y, Wei W, He Z, Fan H (2016) An ultra-lightweight white-box encryption scheme for securing resource-constrained Iot devices. In: Proceedings of the 32nd annual conference on computer security applications, pp 16\u201329","DOI":"10.1145\/2991079.2991086"},{"key":"4322_CR11","unstructured":"SOFTWARE KI (2012) White-box cryptography: hiding keys in software"},{"key":"4322_CR12","doi-asserted-by":"crossref","unstructured":"Muir JA (2012) A tutorial on white-box AES. In: Advances in network analysis and its applications. Springer, pp 209\u2013229","DOI":"10.1007\/978-3-642-30904-5_9"},{"key":"4322_CR13","doi-asserted-by":"crossref","unstructured":"Chow S, Eisen P, Johnson H, Van Oorschot PC (2002) White-box cryptography and an AES implementation. In: International workshop on selected areas in cryptography. Springer, pp 250\u2013270","DOI":"10.1007\/3-540-36492-7_17"},{"key":"4322_CR14","doi-asserted-by":"crossref","unstructured":"Chow S, Eisen P, Johnson H, Van Oorschot (2002) P.C.A white-box des implementation for DRM applications. In: ACM workshop on digital rights management. Springer, pp 1\u201315","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"4322_CR15","doi-asserted-by":"crossref","unstructured":"Wyseur B, Michiels W, Gorissen P, Preneel B (2007) Cryptanalysis of white-box des implementations with arbitrary external encodings. In: International workshop on selected areas in cryptography. Springer, pp 264\u2013277","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"4322_CR16","doi-asserted-by":"crossref","unstructured":"Lepoint T, Rivain M, De Mulder Y, Roelse P, Preneel B (2013) Two attacks on a white-box AES implementation. In: International conference on selected areas in cryptography. Springer, pp 265\u2013285","DOI":"10.1007\/978-3-662-43414-7_14"},{"key":"4322_CR17","doi-asserted-by":"crossref","unstructured":"Xiao Y, Lai X (2009) A secure implementation of white-box AES. In: 2009 2nd international conference on computer science and its applications. IEEE, pp 1\u20136","DOI":"10.1109\/CSA.2009.5404239"},{"key":"4322_CR18","doi-asserted-by":"crossref","unstructured":"Karroumi M (2010) Protecting white-box AES with dual ciphers. In: International conference on information security and cryptology. Springer, pp 278\u2013291","DOI":"10.1007\/978-3-642-24209-0_19"},{"key":"4322_CR19","doi-asserted-by":"crossref","unstructured":"De Mulder Y, Roelse P, Preneel B (2012) Cryptanalysis of the Xiao\u2013Lai White-Box AES implementation. In: International conference on selected areas in cryptography. Springer, pp 34\u201349","DOI":"10.1007\/978-3-642-35999-6_3"},{"key":"4322_CR20","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C, Lepoint T, Paillier P, Rivain M (2013) White-box security notions for symmetric encryption schemes. In: International conference on selected areas in cryptography. Springer, pp 247\u2013264","DOI":"10.1007\/978-3-662-43414-7_13"},{"key":"4322_CR21","doi-asserted-by":"crossref","unstructured":"Bhatia K, Som S (2016) Study on white-box cryptography: key whitening and entropy attacks. In: 2016 5th international conference on reliability, Infocom technologies and optimization (trends and future directions) (ICRITO). IEEE, pp 323\u2013327","DOI":"10.1109\/ICRITO.2016.7784974"},{"key":"4322_CR22","doi-asserted-by":"crossref","unstructured":"Biryukov A, Udovenko A (2018) Attacks and countermeasures for white-box designs. In: International conference on the theory and application of cryptology and information security. Springer, pp 373\u2013402","DOI":"10.1007\/978-3-030-03329-3_13"},{"issue":"8","key":"4322_CR23","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.3390\/sym11081000","volume":"11","author":"DGV Albricci","year":"2019","unstructured":"Albricci DGV, Ceria M, Cioschi F, Fornari N, Shakiba A, Visconti A (2019) Measuring performances of a white-box approach in the iot context. Symmetry 11(8):1000","journal-title":"Symmetry"},{"key":"4322_CR24","doi-asserted-by":"crossref","unstructured":"Saxena A, Wyseur B, Preneel B (2009) Towards security notions for white-box cryptography. In: International conference on information security. Springer, pp 49\u201358","DOI":"10.1007\/978-3-642-04474-8_4"},{"key":"4322_CR25","unstructured":"Preneel B, Wyseur B (2008) White-box cryptography. In: Dagstuhl workshop on security hardware in theory and practice\u2014a marriage of convenience, Date: 2008\/06\/18-2008\/06\/20, Location: Dagstuhl Germany"},{"key":"4322_CR26","doi-asserted-by":"crossref","unstructured":"Biryukov A, Bouillaguet C, Khovratovich D (2014) Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. In: International conference on the theory and application of cryptology and information security. Springer, pp 63\u201384","DOI":"10.1007\/978-3-662-45611-8_4"},{"key":"4322_CR27","doi-asserted-by":"crossref","unstructured":"Bock EA, Amadori A, Brzuska C, Michiels W (2020) On the security goals of white-box cryptography. In: IACR transactions on cryptographic hardware and embedded systems, pp 327\u2013357","DOI":"10.46586\/tches.v2020.i2.327-357"},{"key":"4322_CR28","doi-asserted-by":"crossref","unstructured":"Lu J, Zhao Z, Guo H (2019) White-box implementation of the KMAC message authentication code. In: International conference on information security practice and experience. Springer, pp 248\u2013270","DOI":"10.1007\/978-3-030-34339-2_14"},{"key":"4322_CR29","doi-asserted-by":"crossref","unstructured":"Saha A, Srinivasan C (2019) White-box cryptography based data encryption-decryption scheme for iot environment. In: 2019 5th international conference on advanced computing and communication systems (ICACCS). IEEE, pp 637\u2013641","DOI":"10.1109\/ICACCS.2019.8728331"},{"key":"4322_CR30","doi-asserted-by":"crossref","unstructured":"Kwon J, Lee B, Lee J, Moon D (2020) Fpl: White-box secure block cipher using parallel table look-ups. In: Cryptographers\u2019 track at the RSA conference. Springer, pp 106\u2013128","DOI":"10.1007\/978-3-030-40186-3_6"},{"issue":"3","key":"4322_CR31","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1109\/TII.2019.2929431","volume":"16","author":"Y Shi","year":"2019","unstructured":"Shi Y, Wei W, Zhang F, Luo X, He Z, Fan H (2019) Sdsrs: A novel white-box cryptography scheme for securing embedded devices in iiot. IEEE Trans Industr Inf 16(3):1602\u20131616","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"4322_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K Lauter","year":"2004","unstructured":"Lauter K (2004) The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 11(1):62\u201367","journal-title":"IEEE Wirel Commun"},{"key":"4322_CR33","unstructured":"Rahman SMM, Muir J (2016) System and method for generating and protecting cryptographic keys, Nov. 22. US Patent 9503259"},{"key":"4322_CR34","unstructured":"Hoogerbrugge J, Michiels W, Vullers P (2018) White-box elliptic curve point multiplication, Sept 4. US Patent 10068070"},{"issue":"2","key":"4322_CR35","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1587\/transinf.2019INP0004","volume":"103","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, He D, Huang X, Wang D, Choo K-KR, Wang J (2020) White-box implementation of the identity-based signature scheme in the IEEE p1363 standard for public key cryptography. IEICE Trans Inf Syst 103(2):188\u2013195","journal-title":"IEICE Trans Inf Syst"},{"key":"4322_CR36","doi-asserted-by":"crossref","unstructured":"Feng Q, He D, Wang H, Kumar N, Choo K-KR (2019) White-box implementation of Shamir\u2019s identity-based signature scheme. IEEE Syst J","DOI":"10.1109\/JSYST.2019.2910934"},{"key":"4322_CR37","doi-asserted-by":"crossref","unstructured":"Zhou J, Bai J, Jiang MS (2020) White-box implementation of ECDSA based on the cloud plus side mode. In: Security and communication networks, vol 2020","DOI":"10.1155\/2020\/8881116"},{"key":"4322_CR38","unstructured":"Antoniadis A, Sklavos N (2018) On the white-box cryptography: Design and integration of high performance and lightweight encryption. In: Proceedings of 21th EUROMICRO conference on digital system design, architectures, methods, tools (DSD\u201918)"},{"key":"4322_CR39","doi-asserted-by":"crossref","unstructured":"Ma L, Huang M, Yang S, Wang R, Wang X (2021) An adaptive localized decision variable analysis approach to large-scale multiobjective and many-objective optimization. IEEE Trans Cybern","DOI":"10.1109\/TCYB.2020.3041212"},{"key":"4322_CR40","doi-asserted-by":"crossref","unstructured":"Paar C, Pelzl J (2010) Introduction to public-key cryptography. In: Understanding cryptography. Springer, pp 149\u2013171","DOI":"10.1007\/978-3-642-04101-3_6"},{"key":"4322_CR41","doi-asserted-by":"crossref","unstructured":"Koblitz N (2000) Towards a quarter-century of public key cryptography. Springer","DOI":"10.1007\/978-1-4757-6856-5"},{"issue":"2","key":"4322_CR42","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","volume":"77","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan D, Ray S, Biswas G, Khan M, Dasgupta M (2021) A lightweight remote user authentication scheme for iot communication using elliptic curve cryptography. J Supercomput 77(2):1114\u20131151","journal-title":"J Supercomput"},{"issue":"10","key":"4322_CR43","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1007\/s12555-018-0091-0","volume":"17","author":"Y Kwon","year":"2019","unstructured":"Kwon Y, Lee J (2019) Energy optimization model with variable keep-alive cycle algorithm in wireless sensor network. Int J Control Autom Syst 17(10):2531\u20132540","journal-title":"Int J Control Autom Syst"},{"issue":"9","key":"4322_CR44","doi-asserted-by":"publisher","first-page":"3071","DOI":"10.3390\/s18093071","volume":"18","author":"J-H Park","year":"2018","unstructured":"Park J-H, Kim H-S, Kim W-T (2018) Dm-mqtt: an efficient mqtt based on sdn multicast for massive iot communications. Sensors 18(9):3071","journal-title":"Sensors"},{"key":"4322_CR45","unstructured":"Benefits of MQTT-SN over MQTT. https:\/\/www.oasis-open.org\/committees\/download.php\/66091\/MQTT-SN_spec_v1.2.pdf. Accessed on 26.02.2021"},{"key":"4322_CR46","unstructured":"Stanford-Clark A, Truong HL (2013) Mqtt for sensor networks (mqtt-sn) protocol specification. International business machines (IBM) Corporation version 1(2)"},{"key":"4322_CR47","unstructured":"Differences between MQTT and MQTT-SN. https:\/\/www.oreilly.com\/library\/view\/internet-of-things\/9781788470599\/881de410-96e1-4771-b506-cd7450faadc3.xhtml. Accessed on 26.02.2021"},{"key":"4322_CR48","unstructured":"MQTT For Sensor Networks (MQTT-SN) Protocol Specification. https:\/\/www.oasis-open.org\/committees\/download.php\/66091\/MQTT-SN_spec_v1.2.pdf. Accessed on 28.02.2021"},{"key":"4322_CR49","doi-asserted-by":"crossref","unstructured":"Garner HL (1959) The residue number system. In: Papers presented at the the March 3\u20135, 1959, Western Joint Computer Conference, pp 146\u2013153","DOI":"10.1145\/1457838.1457864"},{"issue":"4","key":"4322_CR50","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/TCS.1977.1084321","volume":"24","author":"W Jenkins","year":"1977","unstructured":"Jenkins W, Leon B (1977) The use of residue number systems in the design of finite impulse response digital filters. IEEE Trans Circuits Syst 24(4):191\u2013201","journal-title":"IEEE Trans Circuits Syst"},{"key":"4322_CR51","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.jocs.2016.10.006","volume":"21","author":"K Sudeepa","year":"2017","unstructured":"Sudeepa K, Aithal G (2017) Generation of maximum length non-binary key sequence and its application for stream cipher based on residue number system. J Comput Sci 21:379\u2013386","journal-title":"J Comput Sci"},{"key":"4322_CR52","unstructured":"Elliptic Curve Cryptography: ECDH and ECDSA. https:\/\/andrea.corbellini.name\/2015\/05\/30\/elliptic-curve-cryptography-ecdh-and-ecdsa\/. Accessed on 22.01.2021"},{"key":"4322_CR53","doi-asserted-by":"crossref","unstructured":"Turner S, Brown D, Yiu K, Housley R, Polk T (2009) Elliptic curve cryptography subject public key information. RFC 5480 (Proposed Standard)","DOI":"10.17487\/rfc5480"},{"key":"4322_CR54","unstructured":"RSA vs ECC : The biggest differentiator between ECC and RSA is key size. https:\/\/www.ssl2buy.com\/wiki\/rsa-vs-ecc-which-is-better-algorithm-for-security. Accessed on 10.02.2021"},{"key":"4322_CR55","doi-asserted-by":"crossref","unstructured":"Dunkels A, Gronvall B, Voigt T (2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks. IEEE, pp 455\u2013462","DOI":"10.1109\/LCN.2004.38"},{"key":"4322_CR56","unstructured":"Meet the Z1 mote. http:\/\/wiki.zolertia.com\/wiki\/index.php\/Main_Page. Accessed on 10.02.2021"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04322-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04322-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04322-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:47:17Z","timestamp":1651862837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04322-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,7]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4322"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04322-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,7]]},"assertion":[{"value":"15 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}