· http://www.gartner.com/newsroom/id/2636073 accessed online 16 Jan. 2017
· Padmavathi, B., Kumari, S. R. (2013) A survey on performance analysis of DES, AES and RSA algorithm along
· with LSB substitution. International Journal of Scienceand Research, 2(4), pp. 170-174
· McKay, K. A., Bassham, L., Turan, M. S., Mouha, N. (2016) Report on Lightweight Cryptography. NIST DRAFT NISTIR, pp. 1-29
· Yick, J., Mukherjee, B., Ghosal, D. (2008) Wireless sensor network survey. Computer networks, 52(12), pp. 2292-2330
· Latré, B., Braem, B., Moerman, I., Blondia, C., Demeester, P. (2011) A survey on wireless body area networks. Wireless Networks, 17(1), pp. 1-18
· Sajid, A., Abbas, H., Saleem, K. (2016) Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp. 1375-1384
· Singh, S., Jeong, Y. S., Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, pp. 200-222
· Singh, S., Sharma, P. K., Park, J. H. (2016). Secure Clouds Forensic Investigative Architecture for Social Network Cloud. Advanced Science Letters, 22(9), 2461-2464
· Kar, J., & Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12(2), pp. 226~233
· Zhou, J., Cao, Z., Dong, X., Vasilakos, A. V. (2017) Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine, 55(1), pp. 26-33
· Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., Park, J. H. (2016) A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions. The Journal of Supercomputing, pp. 1-32
· Fan, X., Mandal, K., Gong, G. (2013) Wg-8: A lightweight stream cipher for resource-constrained smart devices. In: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness Springer Berlin Heidelberg, pp. 617-632
· Iokibe, K., Maeshima, K., Kagotani, H., Nogami, Y., Toyota, Y., Watanabe, T. (2014) Analysis on equivalent current source of AES-128 circuit for HD power model verification. In: Proceeding of 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC'14/Tokyo), IEEE, pp. 302-305
· Rivest, R. L. (1994) The RC5 encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 86-96
· Wheeler, D. J., & Needham, R. M. (1994) TEA, a tiny encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 363-366
· Yu, J., Khan, G., Yuan, F. (2011) Xtea encryption based novel RFID security protocol. In: Proceeding of 24th Canadian Conference on, Electrical and Computer Engineering (CCECE), IEEE, pp. 58-62
· Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007) New lightweight DES variants. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 196-210
· Saputra, H., Vijaykrishnan, N., Kandemir, M., Irwin, M. J., Brooks, R., Kim, S., & Zhang, W. (2003) Masking the energy behavior of DES encryption. In: Proceeding of the conference on Design, Automation and Test in Europe-Volume 1 Computer Society, IEEE, pp. 1-6
· Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L. (2015) The SIMON and SPECK lightweight block ciphers. In: Proceeding of 52nd ACM/EDAC/IEEE, Design Automation Conference (DAC), IEEE, pp. 1-6
· Université du Luxembourg, Lightweight Block Ciphers, https://www.cryptolux.org/index.php/Lightweight_Block_Ciphers, accessed online 22 Jan. 2017
· Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Vikkelsoe, C. (2007) PRESENT: An ultra-lightweight block cipher. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 450-466
· Hosseinzadeh, J., Hosseinzadeh, M. (2016) A Comprehensive Survey on Evaluation of Lightweight Symmetric Ciphers: Hardware and Software Implementation. Advances in Computer Science: an International Journal, 5(4), pp. 31-41
· Mohd, B. J., Hayajneh, T., Vasilakos, A. V. (2015) A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications, 58, pp. 73-93
· Standaert, F. X., Piret, G., Rouvroy, G., Quisquater, J. J., Legat, J. D. (2004) ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 279-298 Feldhofer, M., Rechberger, C. (2006) A case against currently used hash functions in RFID protocols. In: Proceeding of OTM Confederated International Conferences On the Move to Meaningful Internet Systems, Springer Berlin Heidelberg, pp. 372-381
· Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y. (2008) Hash functions and RFID tags: Mind the gap. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 283-299
· Guo, J., Peyrin, T., Poschmann, A. (2011) The PHOTON family of lightweight hash functions. In: Proceeding of Annual Cryptology Conference, Springer Berlin Heidelberg, pp. 222-239
· Aumasson, J. P., Henzen, L., Meier, W., Naya-Plasencia, M. (2013) Quark: A lightweight hash. Journal of cryptology, 26(2), pp. 313-339.
· Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., & Verbauwhede, I. (2011) SPONGENT: A lightweight hash function. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 312-325
· Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H. (2010, December). A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceeding of International Conference on Information Security and Cryptology, Springer Berlin Heidelberg, pp. 151-168
· Bossuet, L., Grand, M., Gaspar, L., Fischer, V., Gogniat, G. (2013) Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Computing Surveys (CSUR), 45(4), pp. 1-41
· Tillich, S., Großschädl, J. (2006) Instruction set extensions for efficient AES implementation on 32-bit processors. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 270-284
· Hodjat, A., Verbauwhede, I. (2004) High-throughput programmable crypto co-processor, IEEE Micro, 24(3) pp. 34-45
· Grand, M., Bossuet, L., Le Gal, B., Gogniat, G., Dallet, D. (2011) Design and implementation of a multi-core crypto-processor for software defined radios. In: Proceeding of International Symposium on Applied Reconfigurable Computing, Springer Berlin Heidelberg, pp. 29-40
· ECRYPT, eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/, accessed online 16 Jan. 2017
· https://www.cryptolux.org/index.php/Lightweight_ Stream Ciphers, accessed online 24 Jan. 2017
· Hell, M., Johansson, T., Meier, W. (2007) Grain: a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2(1), pp. 86-93
· Babbage, S., Dodd, M. (2008). The MICKEY stream ciphers. In: Proceeding of New Stream Cipher Designs, Springer Berlin Heidelberg, pp. 191-209
· Kitsos, P., Sklavos, N., Provelengios, G., Skodras, A. N. (2013) FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocessors and Microsystems, 37(2), pp. 235-245
· Souissi, R., Ben-Ammar, M. (2014) An intelligent wireless sensor network temperature acquisition system with an FPGA. Wireless Sensor Network, 6(1), pp.1-7
· James, M., Kumar, D. S. (2016) An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA. Procedia Technology, 25, pp. 582-589
· Li, L., Liu, B., Wang, H. (2016) QTL: A new ultra-lightweight block cipher. Microprocessors and
· Microsystems, 45, pp. 45-55
· Karakoç, F., Demirci, H., Harmancı, A. E. (2015) AKF: A key alternating Feistel scheme for lightweight cipher designs. Information Processing Letters, 115(2), pp. 359-367
· Bansod, G., Raval, N., Pisharoty, N. (2015) Implementation of a new lightweight encryption design for embedded security. IEEE Transactions on Information Forensics and Security, 10(1), pp. 142-151
· Biswas, K., Muthukkumarasamy, V., Singh, K. (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, 15(5), pp. 2801-2809
· Guo, P., Wang, J., Ji, S., Geng, X. H., Xiong, N. N. (2015) A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. Journal of medical systems, 39(12), pp. 190-198
· Verma, S., Pal, S. K., Muttoo, S. K. (2014) A new tool for lightweight encryption on android. In: Proceeding of Advance Computing Conference (IACC), 2014 IEEE International, IEEE, pp. 306-311
· Peng, C., Du, X., Li, K., Li, M. (2016) An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks. Journal of Sensors, 2016, pp 1-10
· Bansod, G., Patil, A., Sutar, S., Pisharoty, N. (2016) An Ultra Lightweight Encryption Design for Security in Pervasive Computing. In: Proceeding of 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), IEEE. pp. 79-84
· Buja, A. G., Latip, S. F. A. (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Computer Science, 72, pp. 469-476
· Shelby, Z., Hartke, K., Bormann, C. (2014) The constrained application protocol (CoAP), pp. 1-110
· Lee, J. H., & Lim, D. G. (2014). Parallel architecture for high-speed block cipher, HIGHT. International Journal of Security and its Applications, 8(2), pp. 59-66
· Huang, Q., Yang, Y., Shen, M. (2016) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Generation Computer Systems, pp.1-11
· Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., & Yang, A. (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52, pp. 95-108
· Fugkeaw, S., Sato, H. (2016) Improved Lightweight Proxy Re encryption for Flexible and scalable Mobile Revocation Management in Cloud Computing. In: Proceeding of 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), IEEE, pp. 894-899
· Liang, C., Ye, N., Malekian, R., Wang, R. (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: Proceeding of 2016 2nd International Symposium on, Agent, Multi-Agent Systems and Robotics (ISAMSR), IEEE, pp. 160-166
· Baharon, M. R., Shi, Q., Llewellyn-Jones, D. (2015) A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. In: Proceeding of 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE. pp. 618-625
· Zegers, W., Chang, S. Y., Park, Y., & Gao, J. (2015) A Lightweight Encryption and Secure Protocol for Smartphone Cloud. In: Proceeding of 2015 IEEE Symposium on Service-Oriented System Engineering (SOSE), IEEE, pp. 259-266
· Yao, X., Chen, Z., Tian, Y. (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, pp. 104-112
· Yang, Y., Zheng, X., Tang, C. (2016) Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications, pp.1-12
· Sahraoui, S., & Bilami, A. (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Computer Networks, 91, pp. 26-45
· Al Salami, S., Baek, J., Salah, K., & Damiani, E. (2016). Lightweight Encryption for Smart Home. In: Proceeding of 2016 11th International Conference on Availability, Reliability and Security (ARES), , IEEE, pp. 382-388
· Baskar, C., Balasubramaniyan, C., Manivannan, D. (2016) Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA. Procedia Computer Science, 78, pp. 165-171
· ERNEST W., Light primitives and new technologies are driving the next generation of lightweight
· cryptography, http://semiengineering.com/lightweight-cryptography-for-the-ioe/ , accessed online Feb. 2017
· Kar, J., Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing, Journal of Information Processing Systems, 12(2), PP. 226-233
· Mohd, B. J., Hayajneh, T., Khalaf, Z. A. (2015, April). Optimization and modeling of FPGA implementation of the Katan Cipher. In: Proceeding of 2015 6th International Conference on Information and Communication Systems (ICICS), IEEE, pp. 68-72
· Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M. S., Plusquellic, J., Tehranipoor, M. (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design and Test, 30(3), pp. 6-17
· Hayajneh, T., Doomun, R., Al‐Mashaqbeh, G., Mohd, B. J. (2014) An energy‐efficient and security aware route selection protocol for wireless sensor networks. Security and Communication Networks, 7(11), pp. 2015-2038
· Negash, B., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2016). LISA 2.0: lightweight internet of things service bus architecture using node centric networking. Journal of Ambient Intelligence and Humanized Computing, 7(3), pp. 305-319
· Maity, S., Park, J. H. (2016) Powering IoT Devices: A Novel Design and Analysis Technique. Journal of Convergence, 7, pp. 1-18
· Naruse, T., Mohri, M., Shiraishi, Y. (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Computing and Information Sciences, 5(1), pp. 8-25