<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="14578" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/14578?output=omeka-xml" accessDate="2026-05-13T18:35:33+00:00">
  <collection collectionId="5">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64">
                <text>Articles</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="19">
    <name>Article</name>
    <description>Faculty Publications -Articles</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100917">
              <text>End-to-End Encryption in Resource-Constrained IoT Device</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100918">
              <text>Cryptography; lightweight cryptography; security; the IoT</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100919">
              <text>Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities. Ensuring the security, communication, and privacy protection of end-users is a major concern in IoT development. Secure communication is a significant requirement for various applications, especially when communication devices have limited resources. The emergence of IoT also necessitates the use of low-power devices that interconnect with each other for essential processing. These devices are expected to handle large amounts of monitoring and control data while having limited capabilities and resources. The algorithm used for secure encryption should protect vulnerable devices. Conventional encryption methods such as RSA or AES are computationally expensive and require large amounts of memory, which can adversely affect device performance. Simplistic encryption techniques are easily compromised. To address these challenges, an effective and secure lightweight cryptographic process is proposed for computer devices. This process utilizes a symmetrical encryption key block, incorporating a custom proxy network (SP) and a modified Feistel architecture. Security analysis and performance evaluation results demonstrate that the proposed protocol is secure and energy-efficient. The symmetric key encryption scheme is based on sequences in the Feistel cipher, with multiple rounds and sub-keys generated using principles derived from genetic algorithms. This proposed algorithm minimizes processing cycles while providing sufficient security.  2013 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100920">
              <text>Alluhaidan A.S.D.; Prabu P.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="100921">
              <text>IEEE Access, Vol-11, pp. 70040-70051.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="100922">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100923">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="100924">
              <text>&lt;a href="https://doi.org/10.1109/ACCESS.2023.3292829" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ACCESS.2023.3292829&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85164431177&amp;amp;doi=10.1109%2FACCESS.2023.3292829&amp;amp;partnerID=40&amp;amp;md5=a3dcc33f15079833d4625a59de49c3de" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85164431177&amp;amp;doi=10.1109%2fACCESS.2023.3292829&amp;amp;partnerID=40&amp;amp;md5=a3dcc33f15079833d4625a59de49c3de&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100925">
              <text>All Open Access; Gold Open Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="100926">
              <text>ISSN: 21693536</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100927">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100928">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="100929">
              <text>Article</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="100930">
              <text>Alluhaidan A.S.D., Princess Nourah bint Abdulrahman University, College of Computer and Information Sciences, Department of Information Systems, Riyadh, 11564, Saudi Arabia; Prabu P., CHRIST (Deemed to be University), Department of Computer Science, Bengaluru, 560029, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
