{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:12:04Z","timestamp":1766599924773,"version":"3.33.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T00:00:00Z","timestamp":1737504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T00:00:00Z","timestamp":1737504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03618-2","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:18:28Z","timestamp":1737515908000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher"],"prefix":"10.1007","volume":"6","author":[{"given":"Mohammad Ubaidullah","family":"Bokhari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9836-670X","authenticated-orcid":false,"given":"Shahnwaz","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohd Zain","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,22]]},"reference":[{"issue":"5","key":"3618_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1007\/s12530-022-09462-0","volume":"14","author":"MS Jawed","year":"2023","unstructured":"Jawed MS, Sajid M. XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals. Evol Syst. 2023;14(5):749\u201370. https:\/\/doi.org\/10.1007\/s12530-022-09462-0.","journal-title":"Evol Syst"},{"key":"3618_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1377-3","author":"JC Shovic","year":"2016","unstructured":"Shovic JC. Raspberry Pi IoT projects: prototyping experiments for makers. Raspberry Pi IoT Proj Prototyp Exp Mak. 2016. https:\/\/doi.org\/10.1007\/978-1-4842-1377-3.","journal-title":"Raspberry Pi IoT Proj Prototyp Exp Mak"},{"key":"3618_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/9781119527978.ch2","author":"AD Jurcut","year":"2020","unstructured":"Jurcut AD, Ranaweera P, Xu L. Introduction to IoT security. IoT Secur. 2020. https:\/\/doi.org\/10.1002\/9781119527978.ch2.","journal-title":"IoT Secur"},{"key":"3618_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104720","author":"V Amin-Ghafari","year":"2023","unstructured":"Amin-Ghafari V, Lin F, Zhou Z. A new idea in response to fast correlation attacks on small-state stream ciphers. Microprocess Microsyst. 2023. https:\/\/doi.org\/10.1016\/j.micpro.2022.104720.","journal-title":"Microprocess Microsyst"},{"key":"3618_CR5","unstructured":"Bokhari MU, Afzal S. Performance of software and hardware oriented lightweight stream cipher in constraint environment: a review. In: Proceedings of 17th INDIACom; 2023 10th international conference on computing for sustainable global development. INDIACom 2023. 2023. pp. 1667\u201372."},{"key":"3618_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.318","author":"AN Lone","year":"2023","unstructured":"Lone AN, Mustajab S, Alam M. A comprehensive study on cybersecurity challenges and opportunities in the IoT world. Secur Priv. 2023. https:\/\/doi.org\/10.1002\/spy2.318.","journal-title":"Secur Priv"},{"key":"3618_CR7","doi-asserted-by":"publisher","unstructured":"Nandi S, Krishnaswamy S, Mitra P. Recent results on some word oriented stream ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G. In: Information security and privacy digital world\u2014some selected topic. 2023. https:\/\/doi.org\/10.5772\/intechopen.105848.","DOI":"10.5772\/intechopen.105848"},{"issue":"1","key":"3618_CR8","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10586-022-03819-5","volume":"27","author":"M Alam","year":"2024","unstructured":"Alam M, Shahid M, Mustajab S. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. Cluster Comput. 2024;27(1):341\u201376. https:\/\/doi.org\/10.1007\/s10586-022-03819-5.","journal-title":"Cluster Comput"},{"issue":"3","key":"3618_CR9","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.32604\/iasc.2022.025076","volume":"33","author":"K Suwais","year":"2022","unstructured":"Suwais K. Stream cipher based on game theory and DNA coding. Intell Autom Soft Comput. 2022;33(3):1815\u201334. https:\/\/doi.org\/10.32604\/iasc.2022.025076.","journal-title":"Intell Autom Soft Comput"},{"issue":"14","key":"3618_CR10","doi-asserted-by":"publisher","first-page":"18415","DOI":"10.1007\/s11042-018-5663-8","volume":"77","author":"M Qasaimeh","year":"2018","unstructured":"Qasaimeh M, Al-Qassas RS, Tedmori S. Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security. Multim Tools Appl. 2018;77(14):18415\u201349. https:\/\/doi.org\/10.1007\/s11042-018-5663-8.","journal-title":"Multim Tools Appl"},{"key":"3618_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102160","author":"P Pavithran","year":"2021","unstructured":"Pavithran P, Mathew S, Namasudra S, Lorenz P. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Comput Secur. 2021. https:\/\/doi.org\/10.1016\/j.cose.2020.102160.","journal-title":"Comput Secur"},{"issue":"3","key":"3618_CR12","first-page":"938","volume":"7","author":"T Anwar","year":"2015","unstructured":"Anwar T, Kumar A, Paul S. DNA cryptography based on symmetric key exchange. Int J Eng Technol. 2015;7(3):938\u201350.","journal-title":"Int J Eng Technol"},{"key":"3618_CR13","doi-asserted-by":"publisher","unstructured":"Pramanik S, Setua SK. DNA cryptography. In: 2012 7th international conference on electronic and computer enginnering. ICECE 2012. 2012. pp. 551\u20134. https:\/\/doi.org\/10.1109\/ICECE.2012.6471609.","DOI":"10.1109\/ICECE.2012.6471609"},{"issue":"4","key":"3618_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1080\/09720529.2014.995975","volume":"18","author":"AK Kaundal","year":"2015","unstructured":"Kaundal AK, Verma AK. Extending feistel structure to DNA cryptography. J Discret Math Sci Cryptogr. 2015;18(4):349\u201362. https:\/\/doi.org\/10.1080\/09720529.2014.995975.","journal-title":"J Discret Math Sci Cryptogr"},{"key":"3618_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781351011419-1","author":"S Namasudra","year":"2018","unstructured":"Namasudra S, Deka GC. Introduction of DNA computing in cryptography. Adv DNA Comput Cryptogr. 2018. https:\/\/doi.org\/10.1201\/9781351011419-1.","journal-title":"Adv DNA Comput Cryptogr"},{"key":"3618_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102835","author":"S Namasudra","year":"2020","unstructured":"Namasudra S, Sharma S, Deka GC, Lorenz P. DNA computing and table based data accessing in the cloud environment. J Netw Comput Appl. 2020. https:\/\/doi.org\/10.1016\/j.jnca.2020.102835.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"3618_CR17","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.11591\/ijece.v10i1.pp1035-1042","volume":"10","author":"NA Hussein","year":"2020","unstructured":"Hussein NA, Shujaa MI. DNA computing based stream cipher for internet of things using MQTT protocol. Int J Electr Comput Eng. 2020;10(1):1035\u201342. https:\/\/doi.org\/10.11591\/ijece.v10i1.pp1035-1042.","journal-title":"Int J Electr Comput Eng"},{"issue":"3","key":"3618_CR18","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1504\/IJBRA.2016.078235","volume":"12","author":"S Paul","year":"2016","unstructured":"Paul S, Anwar T, Kumar A. An innovative DNA cryptography technique for secure data transmission. Int J Bioinform Res Appl. 2016;12(3):238\u201362. https:\/\/doi.org\/10.1504\/IJBRA.2016.078235.","journal-title":"Int J Bioinform Res Appl"},{"issue":"6","key":"3618_CR19","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1080\/09720529.2020.1818450","volume":"25","author":"M Meftah","year":"2022","unstructured":"Meftah M, Pacha AA, Hadj-Said N. DNA encryption algorithm based on Huffman coding. J Discrete Math Sci Cryptogr. 2022;25(6):1831\u201344. https:\/\/doi.org\/10.1080\/09720529.2020.1818450.","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"3618_CR20","unstructured":"Singh D, Rani P, Kumar R. To design a genetic algorithm for cryptography to enhance the security. Int J Innov Eng Technol. 2013;2(2)."},{"key":"3618_CR21","unstructured":"Chiranjeevi RPK, Kumar SL. Hidden data transmission with variable DNA technology."},{"issue":"6","key":"3618_CR22","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1080\/02522667.2017.1413041","volume":"40","author":"EI Abd El-Latif","year":"2019","unstructured":"Abd El-Latif EI, Moussa MI. Information hiding using artificial DNA sequences based on Gaussian kernel function. J Inf Optim Sci. 2019;40(6):1181\u201394. https:\/\/doi.org\/10.1080\/02522667.2017.1413041.","journal-title":"J Inf Optim Sci"},{"issue":"2","key":"3618_CR23","first-page":"291","volume":"18","author":"E Suresh Babu","year":"2016","unstructured":"Suresh Babu E, Naga Raju C, Krishna Prasad MHM. Inspired pseudo biotic DNA based cryptographic mechanism against adaptive cryptographic attacks. Int J Netw Secur. 2016;18(2):291\u2013303.","journal-title":"Int J Netw Secur"},{"issue":"3","key":"3618_CR24","doi-asserted-by":"publisher","first-page":"396","DOI":"10.4218\/etrij.2017-0220","volume":"40","author":"HD Tiwari","year":"2018","unstructured":"Tiwari HD, Kim JH. Novel method for DNA-based elliptic curve cryptography for IoT Devices. ETRI J. 2018;40(3):396\u2013409. https:\/\/doi.org\/10.4218\/etrij.2017-0220.","journal-title":"ETRI J"},{"issue":"13","key":"3618_CR25","doi-asserted-by":"publisher","first-page":"20537","DOI":"10.1007\/s11042-023-14338-9","volume":"82","author":"AE Adeniyi","year":"2023","unstructured":"Adeniyi AE, Abiodun KM, Awotunde JB, Olagunju M, Ojo OS, Edet NP. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multim Tools Appl. 2023;82(13):20537\u201351. https:\/\/doi.org\/10.1007\/s11042-023-14338-9.","journal-title":"Multim Tools Appl"},{"key":"3618_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/fi15080262","author":"M Al-Zubaidie","year":"2023","unstructured":"Al-Zubaidie M, Shyaa GS. Applying detection leakage on hybrid cryptography to secure transaction information in E-commerce apps. Future Internet. 2023. https:\/\/doi.org\/10.3390\/fi15080262.","journal-title":"Future Internet"},{"issue":"3","key":"3618_CR27","doi-asserted-by":"publisher","first-page":"585","DOI":"10.6688\/JISE.2017.33.3.1","volume":"33","author":"S Namasudra","year":"2017","unstructured":"Namasudra S, Roy P. A new table based protocol for data accessing in cloud computing. J Inf Sci Eng. 2017;33(3):585\u2013609. https:\/\/doi.org\/10.6688\/JISE.2017.33.3.1.","journal-title":"J Inf Sci Eng"},{"key":"3618_CR28","unstructured":"Bokhari MU, Afzal S, Hanafi B, Zeyauddin M. Comparative analysis of LFSR and NLFSR based lightweight stream ciphers for use in IoT. In: Proceedings of 17th INDIACom; 2023 10th international conference on computing for sustainable global development. INDIACom 2023. 2023. pp. 967\u201372."},{"issue":"1","key":"3618_CR29","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell M, Johansson T, Meier W. Grain: a stream cipher for constrained environments. Int J Wirel Mob Comput. 2007;2(1):86\u201393. https:\/\/doi.org\/10.1504\/IJWMC.2007.013798.","journal-title":"Int J Wirel Mob Comput"},{"issue":"5","key":"3618_CR30","doi-asserted-by":"publisher","first-page":"165","DOI":"10.46754\/jssm.2022.05.014","volume":"17","author":"NAN Abdullah","year":"2022","unstructured":"Abdullah NAN, et al. A theoretical comparative analysis of DNA techniques used in DNA based cryptography. J Sustain Sci Manag. 2022;17(5):165\u201378. https:\/\/doi.org\/10.46754\/jssm.2022.05.014.","journal-title":"J Sustain Sci Manag"},{"key":"3618_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/sym11070853","author":"L Ding","year":"2019","unstructured":"Ding L, Liu C, Zhang Y, Ding Q. A new lightweight stream cipher based on chaos. Symmetry (Basel). 2019. https:\/\/doi.org\/10.3390\/sym11070853.","journal-title":"Symmetry (Basel)"},{"key":"3618_CR32","doi-asserted-by":"publisher","unstructured":"C. Manifavas, G. Hatzivasilis, K. Fysarakis, K. Rantos. Lightweight cryptography for embedded systems\u2014a comparative analysis. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 8247 LNCS. 2014. pp. 333\u201349. https:\/\/doi.org\/10.1007\/978-3-642-54568-9_21.","DOI":"10.1007\/978-3-642-54568-9_21"},{"key":"3618_CR33","unstructured":"Rukhin A, Soto J, Nechvatal J. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Nist special publication, vol. 22, no. April, pp. 1\/1\u2013G\/1, 2010. [Online]. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documents\/SP800-22rev1a.pdf."},{"issue":"11","key":"3618_CR34","first-page":"17","volume":"2","author":"NJ Ibrahim","year":"2023","unstructured":"Ibrahim NJ. Improving the efficiency of brute-force attack detection using decision trees: an analysis study. J Eng Mech Mod Archit. 2023;2(11):17\u201325.","journal-title":"J Eng Mech Mod Archit"},{"key":"3618_CR35","doi-asserted-by":"publisher","unstructured":"Maximov A. Cryptanalysis of the \u2018grain\u2019 family of stream ciphers. In: Proceedings of 2006 ACM symposium on information, computer and communications security. ASIACCS \u201906, vol. 2006. 2006. pp. 283\u20138. https:\/\/doi.org\/10.1145\/1128817.1128859.","DOI":"10.1145\/1128817.1128859"},{"key":"3618_CR36","doi-asserted-by":"crossref","unstructured":"Bokhari MU, Alam S. BSF-128: a new synchronous stream cipher design. In: Proceedings international conference on emergency trends in engineering and technology. 2013. pp. 541\u20135.","DOI":"10.1109\/WICT.2012.6409062"},{"key":"3618_CR37","doi-asserted-by":"publisher","unstructured":"Abd-Elmonim WG, Ghali NI, Hassanien AE, Abraham A. Known-plaintext attack of DES-16 using particle swarm optimization. In: Proceedings of 2011 3rd world congress on nature and biologically inspired computing NaBIC 2011. 2011. pp. 12\u201316. https:\/\/doi.org\/10.1109\/NaBIC.2011.6089410.","DOI":"10.1109\/NaBIC.2011.6089410"},{"issue":"3","key":"3618_CR38","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1007\/s11424-021-0042-3","volume":"35","author":"H Li","year":"2022","unstructured":"Li H, Liu R, Liu Z, Pan Y, Xie T. Ciphertext-only attacks against compact-LWE submitted to NIST PQC project. J Syst Sci Complex. 2022;35(3):1173\u201390. https:\/\/doi.org\/10.1007\/s11424-021-0042-3.","journal-title":"J Syst Sci Complex"},{"key":"3618_CR39","doi-asserted-by":"publisher","unstructured":"Leurent G. Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence lecture notes in bioinformatics), vol. 9665. 2016. pp. 344\u201371. https:\/\/doi.org\/10.1007\/978-3-662-49890-3_14.","DOI":"10.1007\/978-3-662-49890-3_14"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03618-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03618-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03618-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:18:38Z","timestamp":1737515918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03618-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,22]]},"references-count":39,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["3618"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03618-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,22]]},"assertion":[{"value":"14 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors confirm that no studies involving human participants were conducted for this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors state that no studies involving human participants were conducted for this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"88"}}