{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:37:13Z","timestamp":1774600633664,"version":"3.50.1"},"reference-count":51,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,20]]},"abstract":"<jats:p>The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to the presence of wireless communication systems. An increasing number of M2M applications, such as smart meters, healthcare monitoring, transportation and packaging, or asset tracking, make a significant contribution to the growth of devices and connections. Within such a large and uncontrollable ecosystem, IoT poses several new problems. Security and privacy are among the most important of these problems. Lightweight cryptography can be used more effectively for small size, low energy, and small footprint such as RFID tags, sensors, and contactless smart cards. Therefore, it can be used to ensure security and privacy in the IoT applications. In this study, PRESENT, CLEFIA, PICCOLO, PRINCE, and LBLOCK lightweight cryptographic algorithms, which can be used to secure data in IoT applications, were analyzed in a test environment. As a result of the tests, the energy consumption of the algorithms, current measurement, active mode working time, and active mode energy consumption were identified and based on this, some inferences have been made.<\/jats:p>","DOI":"10.1155\/2020\/8837671","type":"journal-article","created":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:50:10Z","timestamp":1606006210000},"page":"1-15","source":"Crossref","is-referenced-by-count":21,"title":["Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8069-8204","authenticated-orcid":true,"given":"Bora","family":"Aslan","sequence":"first","affiliation":[{"name":"Department of Software Engineering, K\u0131rklareli University, K\u0131rklareli, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7096-3425","authenticated-orcid":true,"given":"F\u00fcsun","family":"Yavuzer Aslan","sequence":"additional","affiliation":[{"name":"Department of Computer Programming, K\u0131rklareli University, K\u0131rklareli, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6322-0989","authenticated-orcid":true,"given":"M. Tolga","family":"Sakall\u0131","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Trakya University, K\u0131rklareli, Turkey"}]}],"member":"311","reference":[{"key":"1","volume-title":"Technology Breakpoint and Internet of Things","author":"K. Cand\u0131r","year":"2016"},{"key":"2","article-title":"Internet of things (Nesnelerin \u0130nterneti) nedir? Cihazlar\u0131n etkile\u015fim trendleri","author":"E. Yetimler","year":"2017"},{"key":"3","volume-title":"Internet of Things","author":"T. B\u00fcy\u00fcktan\u0131r","year":"2017"},{"key":"4","first-page":"35","article-title":"Developing wireless sensor\/actuator node prototype for internet of things applications","volume":"1","author":"K. Arslan","year":"2016","journal-title":"The Journal of Graduate School of Natural and Applied Sciences of Mehmet Akif Ersoy University"},{"key":"5","volume-title":"Getting Clever about Smart Cities: New Opportunities Require New Business Models","author":"J. B\u00e9lissent","year":"2010"},{"key":"6","article-title":"HoneyThing: nesnelerin interneti i\u00e7in tuzak sistem","author":"\u00d6. Erdem"},{"key":"7","volume-title":"The Internet of Things","author":"ITU","year":"2005"},{"key":"8","volume-title":"Internet of Things\u2014An Action Plan for Europe","author":"C.o.t.E. Communities","year":"2009"},{"key":"9","volume-title":"Report on the Public Consultation on IoT Governance","author":"E. Commission","year":"2013"},{"key":"10","volume-title":"The Internet of Things How the Next Evolution of the Internet is Changing Everything","author":"D. Evans","year":"2011"},{"key":"11","first-page":"548","volume-title":"Fundamentals of Information Systems Security","author":"D. Kim","year":"2016","edition":"3rd"},{"key":"12","article-title":"2020 unit 42 IoT threat report","author":"Unit42","year":"2020"},{"key":"13","first-page":"0311","article-title":"Advanced encryption standard (AES)","author":"FIBS PUB197","year":"2001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"21","article-title":"Information technology-security techniques-lightweight cryptography\u2014part 2: block ciphers","author":"ISO","year":"2012"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_4"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_16"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_21"},{"key":"25","first-page":"5912012","article-title":"Biclique cryptanalysis of PRESENT, LED, and KLEIN","author":"F. Abed","year":"2012"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_25"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01440-6_15"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_15"},{"issue":"10","key":"29","first-page":"88","article-title":"Saturation Cryptanalysis of CLEFIA","volume":"29","author":"W. Wang","year":"2008","journal-title":"Journal of Communications"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.02.024"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27890-7_3"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7589306"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.767445"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_2"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29078-2_1"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_21"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09345-0"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0432"},{"key":"39","first-page":"712","article-title":"On the security of the core of PRINCE against biclique and differential cryptanalysis","author":"F. Abed","year":"2012"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_6"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9175-4"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46706-0_30"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9976-y"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_1"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_16"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_1"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40588-4_1"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0353"},{"key":"49","article-title":"MSP430FR5994LaunchPad\u2122 development kit","volume-title":"User\u2019s Guide","year":"2019"},{"key":"50","article-title":"Code composer studio\u2122 IDE v10.X forMSP430\u2122 MCUs","volume-title":"User\u2019s Guide","year":"2020"},{"key":"51","article-title":"MSP430\u2122 advanced power optimizations: ULP Advisor\u2122 software and EnergyTrace\u2122 technology","volume-title":"Application Report","author":"W. G. BrittanyFinch","year":"2014"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8837671.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8837671.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8837671.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:50:15Z","timestamp":1606006215000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8837671\/"}},"subtitle":[],"editor":[{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,20]]},"references-count":51,"alternative-id":["8837671","8837671"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8837671","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,20]]}}}