{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:39:41Z","timestamp":1772750381945,"version":"3.50.1"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Scientific Research Deanship at the University of Ha\u2019il, Saudi Arabia","award":["RG-24 190"],"award-info":[{"award-number":["RG-24 190"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,10,15]]},"DOI":"10.1109\/jiot.2025.3595649","type":"journal-article","created":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:46:34Z","timestamp":1754333194000},"page":"43296-43316","source":"Crossref","is-referenced-by-count":6,"title":["Taxonomy-Based Lightweight Cryptographic Frameworks for Secure Industrial IoT: A Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3539-4161","authenticated-orcid":false,"given":"Badiea Abdulkarem","family":"Mohammed","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2358-3785","authenticated-orcid":false,"given":"Mahmood A.","family":"Al-Shareeda","sequence":"additional","affiliation":[{"name":"Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, Iraq"}]},{"given":"Raad Z.","family":"Homod","sequence":"additional","affiliation":[{"name":"Department of Oil and Gas Engineering, Basrah University for Oil and Gas, Basra, Iraq"}]},{"given":"Yasser A.","family":"Alkhabra","sequence":"additional","affiliation":[{"name":"Department of Education Technology, College of Education, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-0309","authenticated-orcid":false,"given":"Zeyad Ghaleb","family":"Al-Mekhlafi","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"given":"Gharbi","family":"Alshammari","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7168-1168","authenticated-orcid":false,"given":"Reem","family":"alrashdi","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-5273","authenticated-orcid":false,"given":"Adwan","family":"Alanazi","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s21196647"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298138"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-48325-8_22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.11.027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0318064"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/9781003466284-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s24103111"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3645087"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3485130"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818576-6.00006-X"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s21227518"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2019.08.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC60222.2024.10575469"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.282"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/asi5030056"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4337"},{"key":"ref19","article-title":"Lightweight cryptography for IoT: A state-of-the-art","author":"Thakor","year":"2020","journal-title":"arXiv:2006.13813"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s21082810"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s23104970"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3567439"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2025.3569904"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975208"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s40009-019-0789-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4866"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3355228"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3156629"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61486-6_15"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2024.9010084"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46828-6_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108288"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357090"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164732"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.38152\/bjtv7n4-003"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3260579"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04835-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225757"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2025.2459791"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941701"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3451357"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3494057"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEI.2024.142416"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.024902"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3137104"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927078"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3529757"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-86305-9_14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.62056\/ayfhp2fgx"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3011931"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-6463-471-6_122"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3049141"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/YAC57282.2022.10023768"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-223256"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102778"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1201\/9781003188247-3"},{"key":"ref57","article-title":"A multi-factor homomorphic encryption based method for authenticated access to IoT devices","author":"Aljanah","year":"2023","journal-title":"arXiv:2307.03291"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.3.033012"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08566-1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110537"},{"key":"ref61","article-title":"Dynamic reduced-round TLS extension for energy-saving encryption in wireless IoT communications","author":"Varo","year":"2020"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1201\/9781003457428-10"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2017.08.008"},{"key":"ref64","article-title":"A TrustZone-assisted secure silicon on a co-design framework","author":"Pereira","year":"2018"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON58068.2023.10365899"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.5821\/dissertation-2117-175258"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.4108\/eai.16-12-2020.167654"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2023.3255214"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51473-0_5"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/en14154444"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1002\/9781119812524.ch8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00629-x"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/inventions7040109"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/s16050708"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3145584"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028764"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.65"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4336647"},{"key":"ref79","article-title":"Towards a holistic framework for secure, privacy-aware, and trustworthy Internet of Things using resource-efficient cryptographic schemes","author":"Hossain","year":"2018"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3390\/ma15196561"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3390\/s23115198"},{"issue":"1","key":"ref82","first-page":"127","article-title":"Light weight cryptography (LWC) algorithms in terms of software metric for Industrial Internet of Things (IIoT)","volume":"22","author":"Sivagurunathan","year":"2022","journal-title":"Adv. Appl. Math. Sci"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064066"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.nanoen.2024.109565"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3352402"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3340567"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3227499"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3350910"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3447234"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055650"},{"key":"ref91","first-page":"214","article-title":"Memory footprint reduction for dataflow process networks using virtual channels","volume-title":"Proc. MBMV Workshop","author":"Krebs"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2025.100087"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom63139.2024.00151"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2024.100297"},{"key":"ref95","article-title":"Optimized blockchain deployment and application for trusted Industrial Internet of Things","author":"Li","year":"2024"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11197149\/11112705.pdf?arnumber=11112705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:55:59Z","timestamp":1760032559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11112705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":95,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3595649","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]}}}