In past years, cryptography has been considered a dif cult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8- and 16-bit microcontroller units (MCUs). Previous attempts at implementing cryptographic services on wireless sensor nodes have resulted in high power consumptions, long operating times, and the depletion of memory resources. Over the last decade, however, processors for the IoT and IoE have improved; with increased operating power and memory resources, longer data bus widths and low-power consumption. With the improvements made to processors suitable for building IoT devices, the question remains whether endpoint nodes should still be considered capable of only sup...
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly...
This research was funded by Renesas Electronics Europe GmbH.The exponential growth of IoT makes it a...
Performance dataset of cryptographic algorithms running on the following embedded devices (results i...
Endpoint devices are integral in the realisation of any industrial cyber-physical system (ICPS) appl...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Abstract. Security has been proven a crucial factor in the provision of data services and especially...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceThis paper deals with the energy efficient issue of cryptographic mechanisms u...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
Summarization: Supporting high levels of security in wireless networks is a challenging issue becaus...
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly...
This research was funded by Renesas Electronics Europe GmbH.The exponential growth of IoT makes it a...
Performance dataset of cryptographic algorithms running on the following embedded devices (results i...
Endpoint devices are integral in the realisation of any industrial cyber-physical system (ICPS) appl...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Abstract. Security has been proven a crucial factor in the provision of data services and especially...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceThis paper deals with the energy efficient issue of cryptographic mechanisms u...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
Summarization: Supporting high levels of security in wireless networks is a challenging issue becaus...
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly...
This research was funded by Renesas Electronics Europe GmbH.The exponential growth of IoT makes it a...
Performance dataset of cryptographic algorithms running on the following embedded devices (results i...