![]() ![]() Trust, security, and privacy in IoT-based systems. Lightweight compression and encryption. Physically unclonable functions for IoT. Secure communications for resource-constrained IoT devices. Lightweight security protocols for chipless RFID in IoT applications. Lightweight IoT encryption - Security in IoT devices by using pseudorandom number generators. Cryptographically secure lightweight pseudorandom number generators. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. Randomness in resource-constrained cryptography devices. For purposes of qualifying for peer review and consideration for publication, authors must submit a manuscript according to the following guidelines: The manuscript should be submitted with double-spaced pages (one full blank line between lines of type) using a font size of 11 points or larger, having a margin of at least 1 on all sides. Performance on lightweight cryptography for IoT. ![]() Security hardware randomness for IoT applications. True random number generators for smart card applications. True random number generators for IoT devices. Lightweight reconfigurable pseudorandom number generators. Lightweight pseudorandom number generators. Secure pseudorandom number generators for resource-constrained devices. Pseudorandom number generators for cryptography in IoT applications. Pseudorandom number generators for lightweight encryption. Topics of interest include, but are not limited to, the following: - Pseudorandom number generators for IoT applications. Topics include IoT system architecture, IoT enabling technologies, IoT communication and networking protocols, IoT services and applications, and the social implications. The idea would be to receive research papers that address the various possible approaches. The IEEE IoT Journal (IoT-J), launched in 2014 (Genesis of the IoT-J), publishes papers on the latest advances, as well as review articles, on the various aspects of IoT. There are several approaches to generate pseudorandom number sequences with cryptographic or steganographic quality, and each of them has advantages and disadvantages. The wireless sensor network (WSN) is the central element of the wireless system based on IOT because it contains a number of sensor nodes interconnected. ![]() A component of cryptographic and steganographic systems are pseudorandom number generators, which must generate number sequences with the statistical and robustness requirements for use in information security applications. In this context, cryptographic and steganographic systems must be designed, analyzed and implemented based on lightweight algorithms that can be effective when running on IoT devices. Therefore, hardware and software systems developed for the IoT face significant challenges in maintaining high system connectivity and functionality while preserving information security, as IoT devices have limited capabilities in terms of computing and energy resources. This implies demanding requirements to ensure the confidentiality, integrity and authentication of each customer's data. The Internet of Things (IoT) has an increasing development and demands extensive services from the Internet and cloud infrastructure. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |