{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:11:03Z","timestamp":1753888263141,"version":"3.41.2"},"reference-count":30,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":229,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","award":["TURSP-2020\/239"],"award-info":[{"award-number":["TURSP-2020\/239"]}],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative more power. Therefore, this research work proposes a new hybrid lightweight logical security framework for offering security in IoT (LLSFIoT). The operations, key size, and mechanism used in the proposed framework make its lightweight. The proposed framework is divided into three phases: registration, authentication, and light data security (LDS). LDS offers security by using unique keys at each round bearing small size. Key generation mechanism used is comparatively fast making the compromise of keys as a difficult task. These steps followed in the proposed algorithm design make it lightweight and a better solution for IoT\u2010based networks as compared to the existing solutions that are relatively heavy weight in nature.<\/jats:p>","DOI":"10.1155\/2021\/8526206","type":"journal-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:05:43Z","timestamp":1629335143000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LLSFIoT: Lightweight Logical Security Framework for Internet of Things"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2958-214X","authenticated-orcid":false,"given":"Isha","family":"Batra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6775-9973","authenticated-orcid":false,"given":"Hatem S. A.","family":"Hamatta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6704-6319","authenticated-orcid":false,"given":"Arun","family":"Malik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2417-4374","authenticated-orcid":false,"given":"Mohammed","family":"Baz","sequence":"additional","affiliation":[]},{"given":"Fahad R.","family":"Albogamy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2269-7606","authenticated-orcid":false,"given":"Vishal","family":"Goyal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8194-9354","authenticated-orcid":false,"given":"Sultan S.","family":"Alshamrani","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600522CM"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.039"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.7841465"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.7842420"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841049"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2793301"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06405-y"},{"key":"e_1_2_11_8_2","unstructured":"Hong Internet of Things is now in sync with real life 2016 https:\/\/news.http:\/\/samsung.com\/global\/samsung-shows-that-the-internet-of-things-is-now-in-sync-with-real-life."},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2597150"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.11.003"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2823-6"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0345-9"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.03.005"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119670087.ch12"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700175"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.006"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700809"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06491-y"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_28"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2720635"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2456878"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707465"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_10"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"BeaulieuR. ClarkS. T. ShorsD. WeeksB. SmithJ. andWingersL. The SIMON and SPECK lightweight block ciphers Proceedings of the 52nd Annual Design Automation Conference 2015 San Francisco CA USA 1\u20136 https:\/\/doi.org\/10.1145\/2744769.2747946 2-s2.0-84944080712.","DOI":"10.1145\/2744769.2747946"},{"key":"e_1_2_11_27_2","doi-asserted-by":"crossref","unstructured":"DukaA. V.andGengeB. Implementation of SIMON and SPECK lightweight block ciphers on programmable logic controllers 2017 5th International Symposium on Digital Forensic and Security (ISDFS) 2017 Tirgu Mures Romania 1\u20136 https:\/\/doi.org\/10.1109\/ISDFS.2017.7916501 2-s2.0-85020165095.","DOI":"10.1109\/ISDFS.2017.7916501"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9231-5"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.05.034"},{"key":"e_1_2_11_30_2","series-title":"Lecture Notes in Computer Science","first-page":"18","volume-title":"Fast Software Encryption. FSE 2014","author":"Grosso V.","year":"2014"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8526206.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8526206.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8526206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:51:09Z","timestamp":1723027869000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8526206"}},"subtitle":[],"editor":[{"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8526206"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8526206","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8526206"}}