Skip to main content

Table 1 Summary of related work

From: Efficient adaptive framework for securing the Internet of Things devices

Reference

O1

E2

A3

H4

Remarks

[8], 2014

Identification of possible threats to wearable devices

   

Discussion without proposing any solution

[9], 2011

Mitigating passive attacks like eavesdropping and active attacks like control of wearable devices

✓

  

Rolling cryptographic protocol is used

[10], 2008

Alleviating software attacks on wearable devices

   

Zero power mitigation is used

[13], 2017

Highlighting security issues in architecture elements of IoTs

   

Discussion on possible architectural threats without any solutions

[15], 2013

Identification of security challenges to embedded platforms

   

Discussion without providing any solutions

[16], 2016

To reduce the susceptibility of a circuit layout to hardware trojan insertion

   

Vulnerability analysis of hardware circuit layout is carried out

[17], 2016

To cope with the information leakage in wearable devices

   

Identified the reasons for physiological information leakage and suggested countermeasures such as signal strength reduction, information reduction and noise addition

[18], 2013

To reduce the effect of DoS attacks

   

Proposed modification in network routing protocol by Parno et al [19]

[20], 2013

To increase the trojan detection sensitivity in ICs

✓

✓

 

Use thermal and power maps for trojan detection

[21], 2004

To provide secured authentication for RFID systems

✓

✓

 

Used AES algorithm as a cryptographic primitive

[22], 2017

Efficient implementation of AES for embedded devices

✓

✓

 

Comparison of different AES implementation techniques for embedded devices

This work, 2018

Efficient resource and area throughput based encryption scheme selection for heterogeneous IoT devices

✓

✓

✓

Used matching algorithm to find the encryption scheme

  1. 1Objective
  2. 2Encryption
  3. 3AES
  4. 4Hybrid