{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:32:06Z","timestamp":1775698326566,"version":"3.50.1"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Centre for Geodesy and Geodynamics, National Space Research and Development Agency, Toro, Bauchi State, Nigeria"},{"name":"SECURIoTESIGN Project through FCT\/COMPETE\/FEDER","award":["POCI-01-0145-FEDER-030657"],"award-info":[{"award-number":["POCI-01-0145-FEDER-030657"]}]},{"name":"FCT\/MCTES through National Funds"},{"name":"EU Funds","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["BIM\/n\u00b032\/2018-B00582"],"award-info":[{"award-number":["BIM\/n\u00b032\/2018-B00582"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/133838\/2017"],"award-info":[{"award-number":["SFRH\/BD\/133838\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2965925","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T22:44:56Z","timestamp":1579041896000},"page":"16462-16494","source":"Crossref","is-referenced-by-count":46,"title":["IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2913-9447","authenticated-orcid":false,"given":"Musa G.","family":"Samaila","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7206-7771","authenticated-orcid":false,"given":"Joao B. F.","family":"Sequeiros","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8858-0027","authenticated-orcid":false,"given":"Tiago","family":"Simoes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-5001","authenticated-orcid":false,"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-0666","authenticated-orcid":false,"given":"Pedro R. M.","family":"Inacio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"Lightweight cryptography for embedded systems&#x2014;A comparative analysis","author":"manifavas","year":"2013","journal-title":"Proc 6th Int Workshop Data Privacy Manage Auto Spontaneous Secur 8th Int Workshop (SETOP) (DPM)"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.011581520"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945695"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2007.4382142"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.9790\/4200-0604022632"},{"key":"ref77","article-title":"Hardware design of cryptographic accelerators","author":"baldwin","year":"2013"},{"key":"ref74","article-title":"Balancing energy, security and circuit area in lightweight cryptographic hardware design","author":"portella","year":"2016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCUBE.2017.8394141"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3594-5_2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IC3TSN.2017.8284470"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2006.884574"},{"key":"ref79","first-page":"159","article-title":"Securing electrical substation&#x2019;s wireless messaging with a lightweight crypto-algorithm IP core","author":"abbas","year":"2014","journal-title":"Proc IEEE Int Conf Power Energy (PECon)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500157"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2018.8524703"},{"key":"ref31","article-title":"Cryptographic technology guideline (lightweight cryptography)","volume":"1","year":"2017"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASEA.2018.8370965"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2017.8246424"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2017.8269731"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115506"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2529618"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351145"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/NIGERCON.2017.8281945"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(11)70030-X"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1384917"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2757080"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0193-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879615"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886384"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2897076"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/92.974889"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405468"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.88"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766399"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760478"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799820"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.62"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343262"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800094"},{"key":"ref50","article-title":"Sponge-based pseudo-random number generators","author":"bertoni","year":"2010","journal-title":"Proc Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2016.0107"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927078"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717744169"},{"key":"ref57","first-page":"1","article-title":"Low-latency hardware architecture for cipher-based message authentication code","author":"dhaou","year":"2017","journal-title":"Proc IEEE Int Symp Circuits Syst (ISCAS)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.40"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23004"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2006.1649003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2524514"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2012.49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2910233"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TAPENERGY.2017.8397271"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2017.8070757"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301661"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2017.8068718"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2015.09.001","article-title":"A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues","volume":"58","author":"mohd","year":"2015","journal-title":"J Netw Comput Appl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.156"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref17","first-page":"16:1","article-title":"Security threats and possible countermeasures in IoT applications covering different industry domains","author":"samaila","year":"2018","journal-title":"Proc 8th Int Conf Availability Rel Secur (ARES)"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50758-3_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340514"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365734"},{"key":"ref4","first-page":"240","article-title":"Study of smart home communication protocol&#x2019;s and security & privacy aspects","author":"ray","year":"2017","journal-title":"Proc 7th IEEE Int Conf Commun Syst Netw technol (CSNT)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETECHNXT.2018.8385291"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2018.00035"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"ref85","first-page":"1784","author":"sallam","year":"2018","journal-title":"Proc IEEE Region 10 Conf (TENCON)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326280"},{"key":"ref7","first-page":"431","author":"samaila","year":"2017","journal-title":"A Quick Perspective on the Current State of IoT Security A Survey"},{"key":"ref49","first-page":"181","article-title":"On the indifferentiability of the sponge construction","author":"bertoni","year":"2008","journal-title":"Adv Cryptology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2017.7883727"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.13"},{"key":"ref45","first-page":"v1-168","article-title":"A sufficient condition for constructing some XOR-based iterative target collision resistant rash tunctions","volume":"1","author":"li","year":"2010","journal-title":"Proc Int Conf Comput Design Appl"},{"key":"ref48","first-page":"283","article-title":"Hash functions and RFID tags: Mind the gap","author":"bogdanov","year":"2008","journal-title":"Proc Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.17"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISVDAT.2015.7208129"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2014.17"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2146570"},{"key":"ref43","first-page":"1829","article-title":"A generalized continued fraction-based asynchronous stream cipher for image protection","author":"masmoudi","year":"2009","journal-title":"Proc 17th Eur Signal Process Conf"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08957116.pdf?arnumber=8957116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T20:01:39Z","timestamp":1643313699000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8957116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2965925","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}