{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:10:39Z","timestamp":1773882639474,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876942","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey"],"prefix":"10.1109","author":[{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Samah","family":"Suleiman Al-Zou'bi","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Sami","family":"Askar","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Khaled","family":"AlQawasmi","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Ala'a Saeb","family":"Al-Sherideh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Rami","family":"Almatarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Mohammed","family":"Khouj","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]},{"given":"Mahmoud","family":"Odeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity"}]}],"member":"263","reference":[{"issue":"6","key":"ref1","first-page":"3663","article-title":"A literature survey on Internet of Things (IoT)","volume":"9","author":"Goyal","year":"2018","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2903785"},{"key":"ref4","article-title":"Cryptography review in IoT","volume-title":"2019 4th Conference on Technology In Electrical and Computer Engineering (ETECH2019)","author":"Damghani"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.29322\/ijsrp.8.7.2018.p7978"},{"issue":"15","key":"ref6","first-page":"15","article-title":"A study of encryption algorithms AES, DES and RSA for security","volume":"13","author":"Mahajan","year":"2013","journal-title":"Global journal of computer science and technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365734"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2024-0002"},{"key":"ref9","first-page":"842","article-title":"Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey","author":"Chander","year":"2022","journal-title":"IRJET"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCET56606.2022.10080556"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2414-7_27"},{"key":"ref12","first-page":"27","article-title":"Current lightweight cryptography in iot security: A survey","volume-title":"Extended Abstracts","author":"Rana"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1717\/1\/012072"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.295"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2022.121002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269083"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677341"},{"issue":"10","key":"ref20","article-title":"Dynamic Safety Message Power Control in VANET Using PSO","volume":"3","author":"Samara","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05358-4"},{"issue":"1","key":"ref22","article-title":"Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey","volume":"9","author":"Samara","year":"2020","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref23","author":"AbuJoodeh","year":"2022","journal-title":"Exploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052867"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.31559\/glm2021.10.2.5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.35377\/saucis.02.03.648493"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5540296"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.08.005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2017.8269731"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03046-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231100"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/322\/1\/012013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3341875"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18576\/jsap\/130110"},{"issue":"12","key":"ref37","first-page":"5033","article-title":"Data Integrity Concerns, Requirements, and Proofing in Cloud Computing","volume":"102","author":"Al-Milli","year":"2024","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18576\/jsap\/130108"},{"key":"ref39","first-page":"95","article-title":"Improving Timetable Quality Through Multi-objective Optimization: A Case Study on Postenrolment Course","volume-title":"Business Analytical Capabilities and Artificial Intelligence-enabled Analytics: Applications and Challenges in the Digital Era","volume":"2","author":"Al-Milli","year":"2024"},{"key":"ref40","first-page":"87","article-title":"The Effects of Innovative Technology on Quality Assurance in Higher Education Institutions in Developing Countries: A Case Study of Jordan","volume-title":"Intelligent Systems, Business, and Innovation Research. Studies in Systems, Decision and Control","volume":"489","author":"Al-Ramahi","year":"2024"},{"key":"ref41","first-page":"253","article-title":"The Influence that Covid-19 Has Had on the Electronic Payment System, Including Perspectives on Its Usage, Trust, and Competency","volume-title":"Intelligent Systems, Business, and Innovation Research. Studies in Systems, Decision and Control","volume":"489","author":"Alzeaideen","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v17i13.39395"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/acit58888.2023.10453691"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.8.015"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.3.025"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.5.001"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/icit58056.2023.10226018"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","location":"Zarqa, Jordan","start":{"date-parts":[[2024,12,10]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876942.pdf?arnumber=10876942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:57:20Z","timestamp":1740081440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876942","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}