[1] Lee K.M., Teng W.G., and Hou T.W., 2016. Point-n-press: an intelligent universal remote control system for home appliances. IEEE Transactions on Automation Science and Engineering,13(3), pp. 1308-1317. [2] Stolojescu-Crisan C., Crisan C., and Butunoi B.P., 2021. An IoT-based smart home automation system.Sensors, 21(11), 3784. [3] Iansiti M., and Lakhani K.R., 2017. The truth about blockchain. Harvard Business Review,95(1), pp. 118-127. [4] Khan M.A., and Salah K., 2018. IoT security: review, blockchain solutions, and open challenges.Future Generation Computer Systems, 82, pp. 395-411. [5] Na D., and Park S., 2021. Fusion chain: A decentralized lightweight blockchain for IoT security and privacy.Electronics, 10(4), 391. [6] Alfrhan A., Moulahi T., and Alabdulatif A., 2021. Comparative study on hash functions for lightweight blockchain in internet of things (IoT).Blockchain: Research and Applications, 2(4), 100036. [7] Bouras M.A., Lu Q., Dhelim S., and Ning H., 2021. A lightweight blockchain-based IoT identity management approach.Future Internet, 13(2), 24. [8] Doku R., Rawat D.B., Garuba M., and Njilla L., 2019. LightChain: on the lightweight blockchain for the internet-of-things. In2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 444-448. [9] Zamani M., Movahedi M., and Raykova M., 2018. Rapidchain: scaling blockchain via full sharding. InProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 931-948. [10] IOTA Foundation, https://www.iota.org/, accessed on February 1, 2024. [11] Liu Y., Wang K., Lin Y., and Xu W., 2019. LightChain: a lightweight blockchain system for industrial internet of things. IEEE Transactions on Industrial Informatics,15(6), pp. 3571-3581. [12] pickle — Python object serialization, https://docs.python.org/3/library/pickle.html, accessed on February 1, 2025. [13] Dorri A., Kanhere S.S., Jurdak R., and Gauravaram P., 2019. LSB: A lightweight scalable blockchain for IoT security and anonymity.Journal of Parallel and Distributed Computing, 134, pp. 180-197. [14] Mohanty S.N., Ramya K.C., Rani S.S., Gupta D., Shankar K., Lakshmanaprabu S.K., and Khanna A., 2020. An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy.Future Generation Computer Systems, 102, pp. 1027-1037. [15] Khalid U., Asim M., Baker T., Hung P.C., Tariq M.A., and Rafferty L., 2020. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Computing,23(3), pp. 2067-2087. [16] Latif S., Idrees Z., Ahmad J., Zheng L., and Zou Z., 2021. A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things.Journal of Industrial Information Integration, 21, 100190. [17] Zhang W., Wu Z., Han G., Feng Y., and Shu L., 2020. Ldc: A lightweight dada consensus algorithm based on the blockchain for the industrial internet of things for smart city applications.Future Generation Computer Systems, 108, pp. 574-582. [18] Hash function, https://en.wikipedia.org/wiki/Hash_function, accessed on February 1, 2025. [19] Courtois N.T., Grajek M., and Naik R., 2014. Optimizing sha256 in bitcoin mining. InCryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland , September 22-24, 2014. Proceedings 3, pp. 131-144. [20] Rivest R.,1992. The MD5 message digest algorithm.Request for Comments, 1321. [21] Li J.,2003. MD5 message digest algorithm.IDEA, 128(700), 4469. [22] Saputra M.B., and Umam C., 2023. Distributed MD5 brute force using message passing interface (MPI) on ARM architecture. Jurnal Transformatika,20(2), pp. 105-112. [23] Kareem S.M., and Rahma A.M.S., 2019. A new hybrid (MD5 and RC4) cryptography algorithm using multi-logic states. In2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 285-292. [24] Eastlake 3rd D., and Jones P., 2001. US Secure Hash Algorithm 1 (SHA1) (No. rfc3174). [25] Polk T., Chen L., Turner S., and Hoffman P., 2011. Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms(No. rfc6194). [26] Martino R., and Cilardo A., 2020. SHA-2 acceleration meeting the needs of emerging applications: A comparative survey.IEEE Access, 8, pp. 28415-28436. [27] Bellare M., Canetti R., and Krawczyk H., 1996. Keying hash functions for message authentication. InAdvances in Cryptology—CRYPTO'96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18-22, 1996 Proceedings 16, pp. 1-15. [28] Dang Q.,2008. The keyed-hash message authentication code (hmac). [29] Barker E.B., and Kelsey J.M., 2007. Recommendation for Rand om Number Generation Using Deterministic Rand om Bit Generators (Revised), pp. 800-900. [30] Douceur J.R.,2002. The sybil attack. InInternational Workshop on Peer-to-Peer Systems, pp. 251-260. [31] Nakamoto S.,2008. Bitcoin: A peer-to-peer electronic cash system.Satoshi Nakamoto. [32] Dworkin M.J.,2015. SHA-3 stand ard: permutation-based hash and extendable-output functions. [33] NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition, http://www.nist.gov/itl/csd/sha-100212.cfm, accessed on February 1, 2025. [34] Chang S.J., Perlner R., Burr W.E., Turan M.S., Kelsey J.M., Paul S., and Bassham L.E., 2012. Third-round report of the SHA-3 cryptographic hash algorithm competition.NIST Interagency Report, 7896, 121. [35] Bertoni G., Daemen J., Peeters M., and Van Assche G., 2013. Keccak. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 313-314. [36] Aumasson J.P., Henzen L., Meier W., and Phan R.C.W., 2008. Sha-3 proposal blake.Submission to NIST, 92, 194. |