OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Lightweight cryptography in IoT networks: A survey
Muhammad Rana, Quazi Mamun, Rafiqul Islam
Future Generation Computer Systems (2021) Vol. 129, pp. 77-89
Closed Access | Times Cited: 129

Showing 1-25 of 129 citing articles:

Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 133

A systematic threat analysis and defense strategies for the metaverse and extended reality systems
Sara Qamar, Zahid Anwar, Mehreen Afzal
Computers & Security (2023) Vol. 128, pp. 103127-103127
Closed Access | Times Cited: 99

IoT: Communication protocols and security threats
Apostolos Gerodimos, Λέανδρος Μαγλαράς, Mohamed Amine Ferrag, et al.
Internet of Things and Cyber-Physical Systems (2023) Vol. 3, pp. 1-13
Open Access | Times Cited: 82

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 49

Security and Privacy for Reconfigurable Intelligent Surface in 6G: A Review of Prospective Applications and Challenges
Faisal Naeem, Mansoor Ali, Georges Kaddoum, et al.
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 1196-1217
Open Access | Times Cited: 47

Cryptography Algorithms for Enhancing IoT Security
Fursan Thabit, Özgü Can, Asia Othman Aljahdali, et al.
Internet of Things (2023) Vol. 22, pp. 100759-100759
Closed Access | Times Cited: 44

Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 29

Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection
Zakieh Sharifian, Behrang Barekatain, Alfonso Ariza Quintana, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120404-120404
Closed Access | Times Cited: 25

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Abidemi Emmanuel Adeniyi, Rasheed Gbenga Jimoh, Joseph Bamidele Awotunde
Computers & Electrical Engineering (2024) Vol. 118, pp. 109330-109330
Closed Access | Times Cited: 12

Lightweight block ciphers for resource-constrained environments: A comprehensive survey
Yue Zhong, Jieming Gu
Future Generation Computer Systems (2024) Vol. 157, pp. 288-302
Closed Access | Times Cited: 11

A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
Sunil Kumar, Dilip Kumar, Ramraj Dangi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 31-63
Open Access | Times Cited: 9

Analysis of Consumer IoT Device Vulnerability Quantification Frameworks
Samira A. Baho, Jemal Abawajy
Electronics (2023) Vol. 12, Iss. 5, pp. 1176-1176
Open Access | Times Cited: 21

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
Shraiyash Pandey, Bharat Bhushan
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2987-3026
Closed Access | Times Cited: 7

Machine learning cryptography methods for IoT in healthcare
Tserendorj Chinbat, Samaneh Madanian, David Airehrour, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 7

An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
Internet of Things (2024) Vol. 27, pp. 101314-101314
Open Access | Times Cited: 7

Deep Learning-Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks
K. Ramu, S. V. Raju, Satyanand Singh, et al.
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 7

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
Susila Windarta, Suryadi Suryadi, Kalamullah Ramli, et al.
IEEE Access (2022) Vol. 10, pp. 82272-82294
Open Access | Times Cited: 28

Privacy-Preserving and Security in SDN-Based IoT: A Survey
Hossein Ahmadvand, Chhagan Lal, Hadi Hemmati, et al.
IEEE Access (2023) Vol. 11, pp. 44772-44786
Open Access | Times Cited: 14

A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Information Systems Frontiers (2023)
Open Access | Times Cited: 14

Enhancing IoT data confidentiality and energy efficiency through decision tree-based self-management
Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov
Internet of Things (2024) Vol. 26, pp. 101219-101219
Open Access | Times Cited: 6

Securing smart cities through machine learning: A honeypot‐driven approach to attack detection in Internet of Things ecosystems
Yussuf Ahmed, Kehinde Beyioku, M. Yousefi
IET Smart Cities (2024) Vol. 6, Iss. 3, pp. 180-198
Open Access | Times Cited: 5

Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things
Ibraheem Al-Hejri, Farag Azzedin, Sultan Almuhammadi, et al.
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12919-12934
Closed Access | Times Cited: 4

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 4

Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices
Faeiz Alserhani
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

Page 1 - Next Page

Scroll to top