{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:43:22Z","timestamp":1774950202807,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorithms such as AES, DES, and RSA hamper their ability to run properly. In this paper, a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key (RBFK) cipher is proposed for resource-constrained IoT devices in the edge computing environment. The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method. The RBFK cipher has two key sizes: 64 and 128 bits, with a block size of 64 bits. The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security. The proposed cipher satisfies the Shannon characteristics of confusion and diffusion. The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems (FELICS) tool. The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram, correlation graph, and entropy of encrypted and decrypted images. Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers, these are suitable for IoT devices in an edge computing environment.\n<\/jats:p>","DOI":"10.1186\/s42400-022-00136-7","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T01:03:26Z","timestamp":1675213406000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment"],"prefix":"10.1186","volume":"6","author":[{"given":"Sohel","family":"Rana","sequence":"first","affiliation":[]},{"given":"M. Rubaiyat Hossain","family":"Mondal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3748-0277","authenticated-orcid":false,"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,1]]},"reference":[{"issue":"6","key":"136_CR1","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2021","unstructured":"Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2021) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J 8(6):4004\u20134022. https:\/\/doi.org\/10.1109\/JIOT.2020.3015432","journal-title":"IEEE Internet Things J"},{"key":"136_CR2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/ACCESS.2020.3045115","volume":"9","author":"SU Amin","year":"2021","unstructured":"Amin SU, Hossain MS (2021) Edge intelligence and internet of things in healthcare: a survey. IEEE Access 9:45\u201359. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045115","journal-title":"IEEE Access"},{"key":"136_CR3","doi-asserted-by":"publisher","first-page":"100438","DOI":"10.1109\/ACCESS.2020.2997838","volume":"8","author":"EY Baagyere","year":"2020","unstructured":"Baagyere EY, Agbedemnab PA-N, Qin Z, Daabo MI, Qin Z (2020) A Multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers. IEEE Access 8:100438\u2013100447. https:\/\/doi.org\/10.1109\/ACCESS.2020.2997838","journal-title":"IEEE Access"},{"key":"136_CR4","volume-title":"Power-based side-channel attack for AES key extraction on the Atmega328 microcontroller","author":"U Banerjee","year":"2015","unstructured":"Banerjee U, Ho L, Koppula S (2015) Power-based side-channel attack for AES key extraction on the Atmega328 microcontroller. Massachusetts Institute of Technology, Cambridge"},{"key":"136_CR5","volume-title":"The Simon and Speck block ciphers on AVR 8-bit microcontrollers","author":"R Beaulieu","year":"2014","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2014) The Simon and Speck block ciphers on AVR 8-bit microcontrollers. National Security Agency"},{"issue":"11","key":"136_CR6","doi-asserted-by":"publisher","first-page":"7806","DOI":"10.1109\/TII.2021.3073066","volume":"17","author":"K Cao","year":"2021","unstructured":"Cao K, Hu S, Shi Y, Colombo AW, Karnouskos S, Li X (2021) A survey on edge and edge-cloud computing assisted cyber-physical systems. IEEE Trans Ind Inf 17(11):7806\u20137819. https:\/\/doi.org\/10.1109\/TII.2021.3073066","journal-title":"IEEE Trans Ind Inf"},{"key":"136_CR7","unstructured":"Dinu D, Biryukov A, Gro\u00dfsch\u00e4dl J, Khovratovich D, Corre YL, Perrin L (2015) FELICS\u2014fair evaluation of lightweight cryptographic systems. University of Luxembourg"},{"key":"136_CR8","unstructured":"Federal Information Processing Standards Publication 197 (2001) Announcing the advanced encryption standard (AES), NIST"},{"key":"136_CR9","doi-asserted-by":"publisher","unstructured":"Ferreira G, Paim G, Rocha LM, Santana GM, Neuenfeld RH, Costa EA, Bampi S (xxxx) Low\u2010power fast Fourier transform hardware architecture combining a split\u2010radix butterfly and efficient adder compressors. https:\/\/doi.org\/10.1049\/cdt2.12015","DOI":"10.1049\/cdt2.12015"},{"key":"136_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s42400-020-00066-2","volume":"4","author":"R Gao","year":"2021","unstructured":"Gao R, Li S, Gao Y et al (2021) A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. Cybersecurity 4:3. https:\/\/doi.org\/10.1186\/s42400-020-00066-2","journal-title":"Cybersecurity"},{"key":"136_CR11","unstructured":"http:\/\/www.farnell.com\/datasheets\/1807017.pdf"},{"key":"136_CR12","unstructured":"Jha VK (2011) Cryptanalysis of lightweight block ciphers. Master's Thesis, Aalto University School of Science Degree Programme of Computer Science and Engineering"},{"key":"136_CR13","doi-asserted-by":"publisher","first-page":"5323578","DOI":"10.1155\/2019\/5323578","volume":"2019","author":"B Kim","year":"2019","unstructured":"Kim B, Cho J, Choi B, Park J, Seohindawi H (2019) Compact implementations Of HIGHT block cipher on IoT platforms. Secur Commun Netw 2019:5323578","journal-title":"Secur Commun Netw"},{"issue":"4","key":"136_CR14","first-page":"81","volume":"2","author":"T Komal","year":"2015","unstructured":"Komal T, Ashutosh R, Roshan R, Nalawade SM (2015) Encryption and decryption using artificial neural network. Int Adv Res J Sci Eng Technol 2(4):81\u201383","journal-title":"Int Adv Res J Sci Eng Technol"},{"key":"136_CR15","doi-asserted-by":"crossref","unstructured":"Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, pp 5772\u20135781","DOI":"10.1109\/HICSS.2016.714"},{"issue":"2","key":"136_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","volume":"26","author":"S Li","year":"2016","unstructured":"Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res 26(2):337\u2013359","journal-title":"Internet Res"},{"key":"136_CR17","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8114","volume-title":"Report on lightweight cryptography","author":"KA Mckay","year":"2017","unstructured":"Mckay KA, Bassham L, Turan MS, Mouha N (2017a) Report on lightweight cryptography. National Institute of Standards and Technology, USA"},{"key":"136_CR18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8114","volume-title":"Report on lightweight cryptography, NIST interagency\/internal report (NISTIR)","author":"K McKay","year":"2017","unstructured":"McKay K, Bassham L, Sonmez Turan M, Mouha N (2017b) Report on lightweight cryptography, NIST interagency\/internal report (NISTIR). National Institute of Standards and Technology, Gaithersburg, MD. https:\/\/doi.org\/10.6028\/NIST.IR.8114"},{"key":"136_CR19","doi-asserted-by":"publisher","first-page":"206734","DOI":"10.1109\/ACCESS.2020.3037717","volume":"8","author":"A Narayanan","year":"2020","unstructured":"Narayanan A et al (2020) Key advances in pervasive edge computing for industrial internet of things in 5G and beyond. IEEE Access 8:206734\u2013206754. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037717","journal-title":"IEEE Access"},{"issue":"1","key":"136_CR20","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/JIOT.2017.2767608","volume":"5","author":"J Pan","year":"2018","unstructured":"Pan J, McElhannon J (2018) Future edge cloud and edge computing for internet of things applications. IEEE Internet Things J 5(1):439\u2013449. https:\/\/doi.org\/10.1109\/JIOT.2017.2767608","journal-title":"IEEE Internet Things J"},{"key":"136_CR21","volume-title":"High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers","author":"K Papapagiannopoulos","year":"2016","unstructured":"Papapagiannopoulos K (2016) High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers. Department of Digital Security, Radboud University Nijmegen, Nijmegen"},{"key":"136_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding cryptography, a textbook for students and practitioners","author":"B Preneel","year":"1998","unstructured":"Preneel B (1998) Understanding cryptography, a textbook for students and practitioners. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-04101-3 (ISBN 978-3-642-04100-6 E-ISBN 978-3-642-04101-3)"},{"issue":"3","key":"136_CR23","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/COMST.2020.2997475","volume":"22","author":"W Rafique","year":"2020","unstructured":"Rafique W, Qi L, Yaqoob I, Imran M, Rasool RU, Dou W (2020) Complementing iot services through software defined networking and edge computing: a comprehensive survey. IEEE Commun Surv Tutor 22(3):1761\u20131804. https:\/\/doi.org\/10.1109\/COMST.2020.2997475","journal-title":"IEEE Commun Surv Tutor"},{"key":"136_CR24","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091137","author":"S Rana","year":"2018","unstructured":"Rana S, Hossain S, Shoun HI, Kashem DMA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int J Adv Comput Sci Appl (IJACSA). https:\/\/doi.org\/10.14569\/IJACSA.2018.091137","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"},{"key":"136_CR25","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120623","author":"S Rana","year":"2021","unstructured":"Rana S, Mondal MRH, Parvez AHMS (2021) A new key generation technique based on neural networks for lightweight block ciphers. Int J Adv Comput Sci Appl (IJACSA). https:\/\/doi.org\/10.14569\/IJACSA.2021.0120623","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"},{"issue":"6","key":"136_CR26","first-page":"112","volume":"11","author":"S Rana","year":"2019","unstructured":"Rana S, Wadud AH, Azgar A, Kashem DMA (2019) A survey paper of lightweight block ciphers based on their different design architectures and performance metrics. Int J Comput Eng Inf Technol 11(6):112\u2013118","journal-title":"Int J Comput Eng Inf Technol"},{"key":"136_CR27","doi-asserted-by":"publisher","unstructured":"Sachdev R (2020) Towards security and privacy for edge AI in IoT\/IoE based digital marketing environments. In: 2020 fifth international conference on fog and mobile edge computing (FMEC), 2020, pp 341\u2013346.https:\/\/doi.org\/10.1109\/FMEC49853.2020.9144755","DOI":"10.1109\/FMEC49853.2020.9144755"},{"key":"136_CR28","volume-title":"Cryptography and network security principles and practices","author":"W Stallings","year":"2005","unstructured":"Stallings W (2005) Cryptography and network security principles and practices, 4th edn. Prentice Hall, Hoboken","edition":"4"},{"key":"136_CR29","doi-asserted-by":"crossref","unstructured":"Usman M, Ahmed I, Aslam MI, Khanand S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. Iqra University, Defence View and Department of Electronic Engineering (IJACSA). Int J Adv Comput Sci Appl 8(1)","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"136_CR30","doi-asserted-by":"crossref","unstructured":"Volna E, Kotyrba M, Kocian V, Janosek M (2012) Cryptography based on neural network. In: Proceedings 26th European conference on modelling and simulation \u00a9ECMS Klaus G. Troitzsch, Michael M\u00f6hring","DOI":"10.7148\/2012-0386-0391"},{"issue":"3","key":"136_CR31","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1080\/13504509.2013.785040","volume":"20","author":"S Wang","year":"2013","unstructured":"Wang S, Zhang Z, Ye Z, Wang X, Lin X, Chen S (2013) Application of environmental internet of things on water quality management of urban scenic river. Int J Sustain Dev World Ecol 20(3):216\u2013222","journal-title":"Int J Sustain Dev World Ecol"},{"issue":"99","key":"136_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPROC.2019.2918437","volume":"PP","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: state-of-the-art and challenges. Proc IEEE PP(99):1\u201324. https:\/\/doi.org\/10.1109\/JPROC.2019.2918437","journal-title":"Proc IEEE"},{"key":"136_CR33","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209\u201318237. https:\/\/doi.org\/10.1109\/ACCESS.2018.2820162","journal-title":"IEEE Access"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-022-00136-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-022-00136-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-022-00136-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T01:06:33Z","timestamp":1675213593000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-022-00136-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["136"],"URL":"https:\/\/doi.org\/10.1186\/s42400-022-00136-7","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,1]]},"assertion":[{"value":"25 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}