Lightweight Security Protocols for Internet of Things: A Review (original) (raw)

A lightweight IoT security protocol

2017 1st Cyber Security in Networking Conference (CSNet)

The IoT is a technology that enables the interconnection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to gather and process data of a given environment. It is characterized by their low bit rate and low power consumption, and it uses small size packet in their transmissions. In order to protect the WSN, a mutual authentication between devices is required during the association of a new device. The exchanged data should be authenticated and encrypted. In this work we propose a robust, lightweight and energy-efficient security protocol for the WSN systems. The real tests we made and a performance evaluation of our security protocol are provided.

Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey

IRJET, 2022

In a new computing world called “Internet of Things (IoT)” or “ Smart Objects ” networks, a lot of devices are connected to the Internet. They interact with each other through the network and give a new experience to us. In order to enjoy this new context, security of constrained end point is important. However, the network might be suffered seriously, If one of the end points were compromised. Still, it is not easy to apply sufficient cryptographic functions on constrained resources due to the limitation of their resources [1]. In this paper, a short discussion on the different IoT applications and challenges has been done. Further, the security worries concerning information sharing and following have been included. A comparable assessment of various lightweight encryption and approval estimations is finished. Also, some assessment headings described which further work ought to be adopted on lightweight cryptography estimations [2]

Comparative Study of Lightweight Cryptographic Algorithms for IoT

The deployment of IoT facilitates the physical devices with communication, computation and decision making on the basis of any action occurred on network medium. It raises the need of a secured communication channel among different categories of devices. A notable impact has been seen in our day to day life while communicating among smart devices due to the sudden enhancement in ICT technology. IoT enables users to communicate in heterogeneous environment as each user can deploy different way of communication and computation. Thus, this network becomes more prone to attack by a malicious user compromising security and privacy of network. Through the medium of this paper we try to perform indepth study of currently existing security mechanisms for IoT. First, we are comparing lightweight cryptographic mechanisms in concern with key and block sizes, number of rounds and possible attacks. Secondly, we try to discuss various existing security issues with their possible solutions. In a nutshell, a security solution with less computational complexity and less prone to attacks is required.

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey

ArXiv, 2020

With the advent of advanced technology, IoT introduces a vast number of devices connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT security is paramount. Cryptography is being used to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint nature of IoT devices, the traditional cryptographic protocols may not be suited in all IoT environments. Researchers, as a result, have been proposing various lightweight cryptographic algorithms and protocols. In this paper, we discuss the state of the art lightweight cryptographic protocols for IoT networks and present a comparative analysis of the existing protocols. In doing so, this paper has classified the most current algorithm into two parts, such as symmetric and asymmetric lightweight cryptography. Additionally, we consider several recent developed block cipher and stream cipher algorithms. Furthermore, various research ch...

Lightweight Cryptography to Secure Internet of Things(IoT

In Internet of Things (IoT), the huge connectivity of devices and massive data on the air have made information liable to different type of attacks. Cryptographic algorithms are used to provide confidentiality and maintain the integrity of the data. Lightweight cryptography could be a developing term which secures the information in an improved way utilizing low assets and giving higher throughput, conservativeness and having low power utilization. Lightweight algorithms are for the foremost part utilized as part of IoT innovation more model security with least memory and power utilization. The primary goal of cryptography is to secure the information specified lone the sender and beneficiary can determine and work the information and no other pariah or intruder can perceive or operate it.

Lightweight Authentication Protocol in Internet-of-Things

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020

Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols. However, the distance between the Cloud Server and the end device could hamper the connectivity and also risk the security. Authentication is one of the major issues that needs to be taken care of in this scenario. This paper aims to look into this issue as well as to provide a viable solution.

Securing Communication in MQTT enabled Internet of Things with Lightweight security protocol

EAI Endorsed Transactions on Internet of Things

This paper proposes a security algorithm for Internet of Things (IoT) using simple lightweight cryptographic operations. The main advantage of the proposed algorithm is the simplicity, energy efficiency and the speed of algorithm such that it can be computed quickly using a low-power microcontroller. The encryption of the sensed data is performed using simple operations so as to consume smaller amount of node energy. To test the effectiveness, of the proposed algorithm, an experimental rig is set up to implement the proposed algorithm. The analysis confirms that the proposed algorithm provides end-to-end encryption and imparts security against likely attacks such as brute force attack, spoofing attack, and has small code footprint. It is envisaged that the algorithm can be very useful in securing message transmissions in Internet of Things.

A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

2021

In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.

The solution to improve information security for IoT networks by combining lightweight encryption protocols

Indonesian Journal of Electrical Engineering and Computer Science, 2021

With the strong development of Internet platforms today, many new technologies are applied in most areas of human social life. The development of the internet of things (IoT) has brought to the networking world many innovations with new protocols. Along with that is the complexity of security issues that greatly affect personal data, and limited resources in information technology development and applications. Many security solutions have been researched but none of them is completely effective for the IoT network because of the characteristics of energy, limited resources, processing capacity as well as operating costs. Therefore, we propose an effective solution for comprehensive protection of IoT systems against attacks to network security with improved security protocols. By combining security solutions on the layers of the IoT and code improvement, algorithmic enhancement positively contributes to this important task. In the article, we propose to improve and combine the DTLS P...

A survey of the current state of lightweight cryptography for the Internet of things

2017

The Internet of things offers a promising future for all stakeholders in technology; from researchers to consumers. It comprises a network of entities i.e. everyday objects; capable of sensing, processing, storing data and communicating with other entities. These entities or “things” can be connected to the internet and monitored or controlled through a service on another module like a mobile device or computer application. This model of ubiquitous computing presents a great challenge in the form of maintaining security i.e. confidentiality, integrity, authentication and non-repudiation of data as majority of the devices run on limited resources. Our paper examines the cryptographic solutions that have so far been developed, presents their strengths and weaknesses against each other and lays out some research gaps. We also present some notable institutions and groups that are researching and developing international standards in this field. The authors goal is that this paper is usa...