Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
@article{Thakor2021LightweightCA, title={Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities}, author={Vishal A. Thakor and Mohammad Abdur Razzaque and Muhammad R. A. Khandaker}, journal={IEEE Access}, year={2021}, volume={9}, pages={28177-28193} }
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks. There are many challenges while deploying IoT in a real-world, varying from tiny sensors to servers. Security is considered as the number one challenge in IoT deployments, as most of the IoT devices are physically accessible in the real world and many of them are limited in resources (such as energy, memory, processing…
Figures and Tables from this paper
14 Citations
Lightweight Cryptography for the Encryption of Data Communication of IoT Devices
- Computer ScienceElectronics
- 2021
This paper presents a method of reducing the volume of data transmission between a server and an IoT device, focusing on the bandwidth, transmission security, and system resources of the IoT device.
Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security
- Computer Science
- 2021
The proposed model was designed in such manner that it could be suitable towards both data-level security as well as device level accesscredential security to enable a “Fit-To-All” security solution for IoTs.
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare
- Computer ScienceIEEE Access
- 2022
A holochain-based security and privacy-preserving framework for IoT healthcare systems that overcomes the scalability challenge and is particularly suited for resource constrained IoT scenarios.
A Survey on Stream Ciphers for Constrained Environments
- Computer Science, Mathematics2021 1st Babylon International Conference on Information Technology and Science (BICITS)
- 2021
The Fruit stream cipher has good resistance to known attacks, whereas the Enocoro128 and F-FCSR stream ciphers have large throughputs, as well as a WG, Grain, and MICKEY-128 stream c iphers are faster and more suitable to constrained devices than other studied algorithms.
Efficient hardware implementation for lightweight mCrypton algorithm using FPGA
- Computer ScienceIndonesian Journal of Electrical Engineering and Computer Science
- 2021
A new architecture of mCrypton lightweight cryptographic algorithm which considers the above-mentioned conditions and outperforms similar architectures in terms of area, speed, efficiency and throughput is presented.
Implementation of authenticated encryption with associated data grain-128aead algorithm on stm32f400 processor family
- Computer ScienceTransport and Communications Science Journal
- 2022
The Grain 128-AEAD authenticated encryption with associated data algorithm embedded on low-power and resource-constrained devices is implemented and is considered suitable for IoT platforms and embedded device applications with limited resources and low power consumption.
How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2022
This survey aims to provide a comprehensive overview of ML approaches to enable more effective and less detectable attacks and investigates on cyberattacks integrating machine learning algorithms during the last few years and provides future research directions.
Integration of IoT and Blockchain
- Computer ScienceTechnium Romanian Journal of Applied Sciences and Technology
- 2021
The advantages and challenges of integrating IoT and Blockchain are provided, and different architectures and algorithms proposed by researchers to provide secure data transactions are provided.
A Complete Key Management Scheme for LoRaWAN v1.1 †
- Computer ScienceSensors
- 2021
A complete key management scheme is proposed for LoRaWAN that addresses key updating, key generation, key backup, and key backward compatibility and was shown to meet the primary design consideration of Lo RaWAN, i.e., low power consumption.
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
- Computer ScienceSensors
- 2021
A comprehensive survey of IIoT security is presented and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges, and identifies the remaining open issues and challenges.
References
SHOWING 1-10 OF 175 REFERENCES
A Survey on Lightweight Cryptographic Algorithms
- Computer ScienceTENCON 2018 - 2018 IEEE Region 10 Conference
- 2018
A survey is conducted to compare between selected lightweight cryptographic algorithms, and there are two types of lightweight cryptography algorithms know as block ciphers and stream cipher, both are presented in this paper.
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
- Computer Science
- 2017
A state-of-art of lightweight cryptographic primitives which include lightweight block cipher, hash function, stream ciphers, high performance system, and low resources device for IoT environment are discussed in details.
A review on lightweight cryptography algorithms for data security and authentication in IoTs
- Computer Science, Mathematics2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
- 2017
The comparative analysis of various lightweight encryption and authentication algorithms shows that the lightweight algorithms have good performance as compared to conventional cryptography algorithm in terms of memory requirement, their operations, and power consumption.
A Survey of Lightweight Cryptographic Algorithms for IoT-Based Applications
- Computer ScienceSmart Innovations in Communication and Computational Sciences
- 2018
This paper indicates a concise knowledge of IoT, and lightweight and implemented algorithms compare the performed cryptographic algorithms and yield a proficient conclusion in terms of security, reliance, speed, memory and throughput, applications, and so forth.
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques
- Computer ScienceIEEE Access
- 2018
A simple and effective model for lightweight cipher performance metrics is developed and a novel algorithm to manage cipher energy consumption is presented, which allows low-resource IoT devices to encrypt critical messages during low-energy mode while balancing throughput, energy per bit, and device activity.
Lightweight Cryptography Applicable to Various IoT Devices
- Computer Science
- 2017
The author will describe the security threats of IoT and discuss the countermeasures that are based on encryption, the requirements of lightweight cryptography, the technology and trends, the block cypher TWINE and authenticated encryption OTR that have been developed by NEC.
A Survey on Lightweight Block Ciphers
- Computer Science, Mathematics
- 2014
Comparison of selected symmetric key lightweight block ciphers such as PRINT, PRESENT, EPCBC, DESL, TWINE, Puffin, KLEIN, KATAN, LED, LBLOCK and RECTANGLE is presented.
A survey of the current state of lightweight cryptography for the Internet of things
- Computer Science2017 International Conference on Computer, Information and Telecommunication Systems (CITS)
- 2017
This paper examines the cryptographic solutions that have so far been developed, presents their strengths and weaknesses against each other and lays out some research gaps, and presents some notable institutions and groups that are researching and developing international standards in this field.
BEST-1: A Light Weight Block Cipher
- Computer Science
- 2014
A new block cipher BEST-1 (Better Encryption Security Technique-1) is proposed with 64 bit block length and 128 bit key length and provides good security and better processing speed as a cryptographic algorithm.