Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems

Abstract The widespread adoption of IoT devices has made the production of low-cost systems a priority. Since construction costs are generally directly related to the complexity of security methods, researchers are exploring methods that provide acceptable security with minimal hardware complexity....

Full description

Saved in:
Bibliographic Details
Main Authors: Narges Mokhtari, Amirhossein Safari, Sadegh Sadeghi, Nasour Bagheri, Samad Rostampour, Ygal Bendavid
Format: Article
Language:English
Published: Nature Portfolio 2025-05-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-01041-y
Tags: Add Tag
No Tags, Be the first to tag this record!