Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

@article{Thakor2021LightweightCA,
  title={Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities},
  author={Vishal A. Thakor and Mohammad Abdur Razzaque and Muhammad R. A. Khandaker},
  journal={IEEE Access},
  year={2021},
  volume={9},
  pages={28177-28193}
}
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks. There are many challenges while deploying IoT in a real-world, varying from tiny sensors to servers. Security is considered as the number one challenge in IoT deployments, as most of the IoT devices are physically accessible in the real world and many of them are limited in resources (such as energy, memory, processing… 
Lightweight Cryptography for the Encryption of Data Communication of IoT Devices
TLDR
This paper presents a method of reducing the volume of data transmission between a server and an IoT device, focusing on the bandwidth, transmission security, and system resources of the IoT device.
Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security
TLDR
The proposed model was designed in such manner that it could be suitable towards both data-level security as well as device level accesscredential security to enable a “Fit-To-All” security solution for IoTs.
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare
TLDR
A holochain-based security and privacy-preserving framework for IoT healthcare systems that overcomes the scalability challenge and is particularly suited for resource constrained IoT scenarios.
A Survey on Stream Ciphers for Constrained Environments
  • Sameeh A. Jassim, A. K. Farhan
  • Computer Science, Mathematics
    2021 1st Babylon International Conference on Information Technology and Science (BICITS)
  • 2021
TLDR
The Fruit stream cipher has good resistance to known attacks, whereas the Enocoro128 and F-FCSR stream ciphers have large throughputs, as well as a WG, Grain, and MICKEY-128 stream c iphers are faster and more suitable to constrained devices than other studied algorithms.
Efficient hardware implementation for lightweight mCrypton algorithm using FPGA
TLDR
A new architecture of mCrypton lightweight cryptographic algorithm which considers the above-mentioned conditions and outperforms similar architectures in terms of area, speed, efficiency and throughput is presented.
Implementation of authenticated encryption with associated data grain-128aead algorithm on stm32f400 processor family
TLDR
The Grain 128-AEAD authenticated encryption with associated data algorithm embedded on low-power and resource-constrained devices is implemented and is considered suitable for IoT platforms and embedded device applications with limited resources and low power consumption.
How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
TLDR
This survey aims to provide a comprehensive overview of ML approaches to enable more effective and less detectable attacks and investigates on cyberattacks integrating machine learning algorithms during the last few years and provides future research directions.
Integration of IoT and Blockchain
  • M. N. Brohi
  • Computer Science
    Technium Romanian Journal of Applied Sciences and Technology
  • 2021
TLDR
The advantages and challenges of integrating IoT and Blockchain are provided, and different architectures and algorithms proposed by researchers to provide secure data transactions are provided.
A Complete Key Management Scheme for LoRaWAN v1.1 †
TLDR
A complete key management scheme is proposed for LoRaWAN that addresses key updating, key generation, key backup, and key backward compatibility and was shown to meet the primary design consideration of Lo RaWAN, i.e., low power consumption.
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
TLDR
A comprehensive survey of IIoT security is presented and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges, and identifies the remaining open issues and challenges.
...
...

References

SHOWING 1-10 OF 175 REFERENCES
A Survey on Lightweight Cryptographic Algorithms
TLDR
A survey is conducted to compare between selected lightweight cryptographic algorithms, and there are two types of lightweight cryptography algorithms know as block ciphers and stream cipher, both are presented in this paper.
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
TLDR
A state-of-art of lightweight cryptographic primitives which include lightweight block cipher, hash function, stream ciphers, high performance system, and low resources device for IoT environment are discussed in details.
A review on lightweight cryptography algorithms for data security and authentication in IoTs
TLDR
The comparative analysis of various lightweight encryption and authentication algorithms shows that the lightweight algorithms have good performance as compared to conventional cryptography algorithm in terms of memory requirement, their operations, and power consumption.
A Survey of Lightweight Cryptographic Algorithms for IoT-Based Applications
  • Ankit Shah
  • Computer Science
    Smart Innovations in Communication and Computational Sciences
  • 2018
TLDR
This paper indicates a concise knowledge of IoT, and lightweight and implemented algorithms compare the performed cryptographic algorithms and yield a proficient conclusion in terms of security, reliance, speed, memory and throughput, applications, and so forth.
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques
TLDR
A simple and effective model for lightweight cipher performance metrics is developed and a novel algorithm to manage cipher energy consumption is presented, which allows low-resource IoT devices to encrypt critical messages during low-energy mode while balancing throughput, energy per bit, and device activity.
Lightweight Cryptography Applicable to Various IoT Devices
TLDR
The author will describe the security threats of IoT and discuss the countermeasures that are based on encryption, the requirements of lightweight cryptography, the technology and trends, the block cypher TWINE and authenticated encryption OTR that have been developed by NEC.
A Survey on Lightweight Block Ciphers
TLDR
Comparison of selected symmetric key lightweight block ciphers such as PRINT, PRESENT, EPCBC, DESL, TWINE, Puffin, KLEIN, KATAN, LED, LBLOCK and RECTANGLE is presented.
A survey of the current state of lightweight cryptography for the Internet of things
TLDR
This paper examines the cryptographic solutions that have so far been developed, presents their strengths and weaknesses against each other and lays out some research gaps, and presents some notable institutions and groups that are researching and developing international standards in this field.
Implementation of new hybrid lightweight cryptosystem
BEST-1: A Light Weight Block Cipher
TLDR
A new block cipher BEST-1 (Better Encryption Security Technique-1) is proposed with 64 bit block length and 128 bit key length and provides good security and better processing speed as a cryptographic algorithm.
...
...