{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:58:07Z","timestamp":1756310287715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T00:00:00Z","timestamp":1529971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,26]]},"DOI":"10.1145\/3231053.3231100","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T14:00:37Z","timestamp":1535637637000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["A review of data security and cryptographic techniques in IoT based devices"],"prefix":"10.1145","author":[{"given":"Ghulam","family":"Mustafa","sequence":"first","affiliation":[{"name":"National textile University, Faisalabad, Pakistan"}]},{"given":"Rehan","family":"Ashraf","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]},{"given":"Muhammad Ayzed","family":"Mirza","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]},{"given":"Abid","family":"Jamil","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]},{"family":"Muhammad","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2018,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8072001"},{"key":"e_1_3_2_1_2_1","volume-title":"Survey of Security and Privacy Issues of Internet of Things. arXiv Preprint arXiv:1501.02211, 7.","author":"Borgohain T.","year":"2015","unstructured":"Borgohain , T. , Kumar , U. , & Sanyal , S. ( 2015 ). Survey of Security and Privacy Issues of Internet of Things. arXiv Preprint arXiv:1501.02211, 7. Retrieved from http:\/\/arxiv.org\/abs\/1501.02211 Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of Security and Privacy Issues of Internet of Things. arXiv Preprint arXiv:1501.02211, 7. Retrieved from http:\/\/arxiv.org\/abs\/1501.02211"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jabbar S. Malik K. R. Ahmad M. Aldabbas O. Asif M. Khalid S. Han K. J. Ahmad S. H. \"A Methodology of Real-Time Data Fusion for Localized Big Data Analytics\" in IEEE ACCESS IEEE 2018.  Jabbar S. Malik K. R. Ahmad M. Aldabbas O. Asif M. Khalid S. Han K. J. Ahmad S. H. \"A Methodology of Real-Time Data Fusion for Localized Big Data Analytics\" in IEEE ACCESS IEEE 2018.","DOI":"10.1109\/ACCESS.2018.2820176"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5120\/15764-4454"},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"1007","volume":"8","author":"Baby A.","year":"2017","unstructured":"Baby , A. , Scholar , P. G. , & Krishnan , H. ( 2017 ). Combined Strength of Steganography and Cryptography- A Literature Survey , 8 ( 3 ), 1007 -- 1010 . Baby, A., Scholar, P. G., & Krishnan, H. (2017). Combined Strength of Steganography and Cryptography- A Literature Survey, 8(3), 1007--1010.","journal-title":"Combined Strength of Steganography and Cryptography- A Literature Survey"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE","author":"Ahmad M.","year":"2018","unstructured":"Ahmad , M. , Jabbar , S. , & Ahmad , A. \"A Sustainable Solution to Support Data Security in High Bandwidth Health Care Remote Locations by using TCP CUBIC Mechanism\" in IEEE Transaction on Sustainable Computing , , IEEE , 2018 . Ahmad, M., Jabbar, S., & Ahmad, A. \"A Sustainable Solution to Support Data Security in High Bandwidth Health Care Remote Locations by using TCP CUBIC Mechanism\" in IEEE Transaction on Sustainable Computing, , IEEE, 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/15764-4454"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60170-0_1"},{"issue":"8","key":"e_1_3_2_1_10_1","first-page":"4006","article-title":"Towards designing efficient lightweight ciphers for internet of things","volume":"11","author":"Tausif M.","year":"2017","unstructured":"Tausif , M. , Ferzund , J. , Jabbar , S. , & Shahzadi , R. ( 2017 ). Towards designing efficient lightweight ciphers for internet of things . KSII Transactions on Internet and Information Systems , 11 ( 8 ), 4006 -- 4024 . Tausif, M., Ferzund, J., Jabbar, S., & Shahzadi, R. (2017). Towards designing efficient lightweight ciphers for internet of things. KSII Transactions on Internet and Information Systems, 11(8), 4006--4024.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_3_2_1_11_1","volume-title":"SIT: A Lightweight Encryption Algorithm for Secure Internet of Things, 8(1)","author":"Usman M.","year":"2017","unstructured":"Usman , M. , Ahmed , I. , Aslam , M. I. , Khan , S. , & Shah , U. A. ( 2017 ). SIT: A Lightweight Encryption Algorithm for Secure Internet of Things, 8(1) . Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A Lightweight Encryption Algorithm for Secure Internet of Things, 8(1)."},{"key":"e_1_3_2_1_12_1","volume-title":"Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach. Proceedings - 2016 IEEE International Conference on Internet of Things","author":"Kumar M.","year":"2017","unstructured":"Kumar , M. , Kumar , S. , Budhiraja , R. , Das , M. K. , & Singh , S. ( 2017 ). Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach. Proceedings - 2016 IEEE International Conference on Internet of Things ; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, (3), 424--428. Kumar, M., Kumar, S., Budhiraja, R., Das, M. K., & Singh, S. (2017). Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach. Proceedings - 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, (3), 424--428."},{"key":"e_1_3_2_1_13_1","first-page":"40","volume-title":"A new ultra-lightweight block cipher,\" in 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), feb","author":"Patil J.","year":"2017","unstructured":"Patil , J. , Bansod , G. , & Kant , K. S. \" LiCi : A new ultra-lightweight block cipher,\" in 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), feb 2017 , pp. 40 -- 45 . Patil, J., Bansod, G., & Kant, K. S. \"LiCi: A new ultra-lightweight block cipher,\" in 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), feb 2017, pp. 40--45."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings - 2016 2nd IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2016, 296--301","author":"Das R.","year":"2017","unstructured":"Das , R. , & Das , I. ( 2017 ). Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques . Proceedings - 2016 2nd IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2016, 296--301 . Das, R., & Das, I. (2017). Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques. Proceedings - 2016 2nd IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2016, 296--301."},{"key":"e_1_3_2_1_15_1","first-page":"287","volume-title":"A New lightweight Message Authentication code Using Cellular Automata for RFID. nov","author":"Echandouri B.","year":"2017","unstructured":"Echandouri , B. , Hanin , C. , Omary , F. , & Elbernoussi , S. (n.d.). LCAHASH-MAC : A New lightweight Message Authentication code Using Cellular Automata for RFID. nov 2017 , pp. 287 -- 298 . Echandouri, B., Hanin, C., Omary, F., & Elbernoussi, S. (n.d.). LCAHASH-MAC : A New lightweight Message Authentication code Using Cellular Automata for RFID. nov 2017, pp. 287--298."},{"key":"e_1_3_2_1_16_1","volume-title":"Security in Computing and Communications, 325--336.","author":"Bapat C.","year":"2017","unstructured":"Bapat , C. , Baleri , G., B, S. I. , & Nimkar , A. V. ( 2017 ). Smart-Lock Security Re-engineered Using Cryptography and Steganography , Security in Computing and Communications, 325--336. Bapat, C., Baleri, G., B, S. I., & Nimkar, A. V. (2017). Smart-Lock Security Re-engineered Using Cryptography and Steganography, Security in Computing and Communications, 325--336."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3355-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4333-y"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 129--132","author":"Indrayani R.","year":"2017","unstructured":"Indrayani , R. , Nugroho , H. A. , Hidayat , R. , & Pratama , I. ( 2017 ). Increasing the security of MP3 steganography using AES Encryption and MD5 hash function . Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 129--132 . Indrayani, R., Nugroho, H. A., Hidayat, R., & Pratama, I. (2017). Increasing the security of MP3 steganography using AES Encryption and MD5 hash function. Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 129--132."},{"issue":"9","key":"e_1_3_2_1_20_1","first-page":"59","volume":"9","author":"Manimegalai M.","year":"2013","unstructured":"V, M. B., Manimegalai , M. , & Sinduja , V. ( 2013 ). Enhancement of Image Security with New Methods of Cryptography and Steganography , 9 ( 9 ), 59 -- 64 . V, M. B., Manimegalai, M., & Sinduja, V. (2013). Enhancement of Image Security with New Methods of Cryptography and Steganography, 9(9), 59--64.","journal-title":"Enhancement of Image Security with New Methods of Cryptography and Steganography"},{"volume-title":"LSB Based Image Steganography Using Dynamic Key Cryptography. 2016 International Conference on Emerging Trends in Communication Technologies (ETCT)","author":"Patel N.","key":"e_1_3_2_1_21_1","unstructured":"Patel , N. , & Meena , S. (n.d.). LSB Based Image Steganography Using Dynamic Key Cryptography. 2016 International Conference on Emerging Trends in Communication Technologies (ETCT) , Patel, N., & Meena, S. (n.d.). LSB Based Image Steganography Using Dynamic Key Cryptography. 2016 International Conference on Emerging Trends in Communication Technologies (ETCT),"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.064"}],"event":{"name":"ICFNDS'18: International Conference on Future Networks and Distributed Systems","acronym":"ICFNDS'18","location":"Amman Jordan"},"container-title":["Proceedings of the 2nd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231053.3231100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3231053.3231100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:01Z","timestamp":1750212421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231053.3231100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,26]]},"references-count":22,"alternative-id":["10.1145\/3231053.3231100","10.1145\/3231053"],"URL":"https:\/\/doi.org\/10.1145\/3231053.3231100","relation":{},"subject":[],"published":{"date-parts":[[2018,6,26]]},"assertion":[{"value":"2018-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}