Lightweight Cryptography for Internet of Things: A Review
DOI:
https://doi.org/10.4108/eetiot.5565Keywords:
Lightweight Cryptography, Internet of Things, IoT, Cryptography, Block Cipher, Advanced Standard Encryption, AESAbstract
The paper examines the rising significance of security in Internet of Things (IoT) applications and emphasizes the need for lightweight cryptographic solutions to protect IoT devices. It acknowledges the growing prevalence of IoT in various fields, where sensors collect data, and computational systems process it for action by actuators. Due to IoT devices' resource limitations and networked nature, security is a concern. The article compares different lightweight cryptographic block cipher algorithms to determine the best approach for securing IoT devices. It also discusses the merits of hardware versus software solutions and explores potential security threats, including intrusion and manipulation. Additionally, the article outlines future work involving the implementation of the trusted Advanced Standard Encryption block cipher in IoT devices, including its use in quick-response (QR) code scanning and messaging platforms. It acknowledges existing drawbacks and suggests areas for improvement in IoT system performance and security.
Downloads
References
Global IoT and non-IoT connections 2010–2025 (accessed on 17 august 2023), 2023.
URL https://www.statista.com/statistics/1101442/.
Georgiev, D. Internet of Things Statistics, Facts & Predictions [2023′s Update]. Available online: https://review42.com/resources/internet-of-things-stats/
Ding, J., Nemati, M., Ranaweera, C., and Choi, J. IoT Connectivity Technologies and Applications: A Survey. IEEE Access. 2020; 8: 67646-67673. DOI: https://doi.org/10.1109/ACCESS.2020.2985932
Alfred Y. Network Security. Malaysia: Asia Pacific University; 2019. pp. 5-11.
Tariq, U., Ahmed, I., Bashir, A.K., Shaukat, K. A. Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors. 2023; 23: 4117. DOI: https://doi.org/10.3390/s23084117
Caraveo-Cacep, M.A., Vázquez-Medina, R., Zavala, A.H. A survey on low-cost development boards for applying cryptography in IoT systems. Internet of Things. 2023; 22: 100743. DOI: https://doi.org/10.1016/j.iot.2023.100743
Majumdar, A., Laskar, N.M., Biswas, A., Sood, S.K., Baishnab, K.L. Energy efficient e-healthcare framework using HWPSO-based clustering approach. J Intell Fuzzy Syst. 2018; 36(5):1–13. DOI: https://doi.org/10.3233/JIFS-169957
Velmurugan, T., Prakasam, P., Mohameed, V.N., Saravanan, K. Smart garbage monitoring and navigation system using IoT. Int. J. Innov. Technol. Expl. Eng. 2019; 8 (11): 3992–3996.
Mista, S., Roy, C., Mukherjee, A. Introduction to Industrial Internet of Things and Industry 4.0. 1st ed. Florida: CRC Press; 2021. DOI: https://doi.org/10.1201/9781003020905
Stolojescu-Crisan, C., Crisan, C., & Butunoi, B. P. An iot based smart home automation system. Sensors. 2021; 21(11): 3784. DOI: https://doi.org/10.3390/s21113784
Abu-Tair, M., Djahel, S., Perry, P., et al. Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors. 2020; 20(21): 6131. DOI: https://doi.org/10.3390/s20216131
William, S. Cryptography and Network Security: Principles and Practice. 8th ed. London: Pearson; 2017.
Gunathilake, N. A., Buchanan, W. J., and Asif, R. Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. In: IEEE 5th World Forum on Internet of Things (WF-IoT). 2019. DOI: https://doi.org/10.1109/WF-IoT.2019.8767250
Bhagat, V., Kumar, S., Gupta, S.K., Chaube, M.K. Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. Concurrency and Computation Practice and Experience. 2023; 35(10): e7425. DOI: https://doi.org/10.1002/cpe.7425
Silva, C., Cunha, V.A., Barraca, J.P. et al. Analysis of the Cryptographic Algorithms in IoT Communications. Inf Syst Front. 2023. DOI: https://doi.org/10.1007/s10796-023-10383-9
Thakor, V.A., Razzaque, M.A., and Khandaker, M.R.A. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access. 2021; 9: 28177-28193. DOI: https://doi.org/10.1109/ACCESS.2021.3052867
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and Sikdar, B. A survey on iot security: Application areas, security threats, and solution architectures. IEEE Access. 2019; 7: 82721-82743. DOI: https://doi.org/10.1109/ACCESS.2019.2924045
Dutta, I. K., Ghosh, B., and Bayoumi, M.A. Lightweight Cryptography for Internet of Insecure Things : A Survey. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 2019. 475-481. DOI: https://doi.org/10.1109/CCWC.2019.8666557
Sadkhan, S. B. and Salman, A. O. A survey on lightweight-cryptography status and future challenges. In: International Conference on Advance of Sustainable Engineering and its Application (ICASEA), Wasit - Kut, Iraq. 2018. 105-108. DOI: https://doi.org/10.1109/ICASEA.2018.8370965
Ammar, M., Russello, G., and Crispo, B. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications. 2018; 38: 8–27. DOI: https://doi.org/10.1016/j.jisa.2017.11.002
Dhanda, S. S., Singh, B. and Jindal, P. Lightweight Cryptography: A Solution to Secure IoT. Wireless Personal Communications. 2020; 112(3): 1947–1980. DOI: https://doi.org/10.1007/s11277-020-07134-3
Mousavi, S. K., Ghaffari, A., Besharat, S., et al. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks. 2021. 27(2): 1515-1555. DOI: https://doi.org/10.1007/s11276-020-02535-5
Dutta, N.S., and Chakraborty, S. A survey on implementation of lightweight block ciphers for resource constraints devices. Journal of Discrete Mathematical Sciences and Cryptography. 2020; 1–22.
Rana, M., Mamun, Q., and Islam, R. Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems. 2022; 129: 77-89. DOI: https://doi.org/10.1016/j.future.2021.11.011
Bhardwaj, I., Kumar, A., and Bansal, M. A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India; 2017. p. 504-509. DOI: https://doi.org/10.1109/ISPCC.2017.8269731
Okello, W.J., Liu, Q., Siddiqui, F.A. and Zhang, C. A survey of the current state of lightweight cryptography for the Internet of things. In: International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, China; 2017. p. 292-296.
Wei, Y., Xu, P., and Rong, Y. Related-key impossible differential cryptanalysis on lightweight cipher TWINE. J Ambient Intell Human Comput. 2019; 10(2): 509–517. DOI: https://doi.org/10.1007/s12652-017-0675-1
Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. 2017; 1–18. DOI: https://doi.org/10.1007/s12652-017-0494-4
Yu, W., and Kose, S. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks. IEEE Transactions on Circuits and Systems I: Regular Papers. 2017; 64(11) : 2934-2944. DOI: https://doi.org/10.1109/TCSI.2017.2702098
Jithendra, K. B. and Shahana, T.K. New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192. International Conference On Advances in Communication and Computing Technology (ICACCT), Sangamner, India; 2018. p. 1-5. DOI: https://doi.org/10.1109/ICACCT.2018.8529666
Pammu, A. A., Chong, K. -S., Ho, W.-G., and Gwee, B. -H. Interceptive side channel attack on AES-128 wireless communications for IoT applications. In: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Jeju, Korea (South); 2016. p. 650-653. DOI: https://doi.org/10.1109/APCCAS.2016.7804081
Zhu, L., Wang, Y., and Li, R. Efficient differential fault analysis attacks to AES decryption for low ost sensors in IoTs. In: IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, Canada; 2016. p. 554-557. DOI: https://doi.org/10.1109/ISCAS.2016.7527300
Reyhani-masoleh, A., Taha, M., and Ashmawy, D. New Area Record for the AES Combined S-box / Inverse S-box. In: IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, USA; 2018. p. 145-152. DOI: https://doi.org/10.1109/ARITH.2018.8464780
Shah, T., Haq, T. U., Farooq, G. Serpent Algorithm: An improvement by 4 × 4 S - box from finite Chain ring. In: International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan; 2018. p. 1-6. DOI: https://doi.org/10.1109/ICAEM.2018.8536293
Parikh, P., and Narkhede, S. High performance implementation of mixing of column and inv-mixing of column for AES on FPGA. In: International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), Melmaruvathur, India; 2016. p. 174-179. DOI: https://doi.org/10.1109/ICCPEIC.2016.7557244
Li, H., and Friggstad, Z. An efficient architecture for the AES mix columns operation. In: IEEE International Symposium on Circuits and Systems (ISCAS), Kobe; 2005. vol 5. p. 4637-4640.
Banik, S., Bogdanov, A., and Regazzoni, F. Exploring Energy Efficiency of Lightweight Block Ciphers. In: Dunkelman, O., Keliher, L. (eds) Selected Areas in Cryptography – SAC, Lecture Notes in Computer Science, Springer; 2015. vol 9566. DOI: https://doi.org/10.1007/978-3-319-31301-6_10
Zhao, W., Ha, Y., and Alioto, M. AES architectures for minimum energy operation and silicon demonstration in 65nm with lowest energy encryption. In: IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal; 2015. p. 2349-2352. DOI: https://doi.org/10.1109/ISCAS.2015.7169155
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and Iwata, T. The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (eds) Fast Software Encryption. FSE Lecture Notes in Computer Science, Springer, Berlin, Heidelberg; 2007. vol 4593. DOI: https://doi.org/10.1007/978-3-540-74619-5_12
Kim, B., Cho, J., Choi, B., Park, J., Seo, H. Compact Implementations of HIGHT Block Cipher on IoT Platforms. Security and Communication Networks. 2019; 5323578: 1-10. DOI: https://doi.org/10.1155/2019/5323578
Leander, G., Paar, C., Poschmann, A., Schramm, K. New Lightweight DES Variants. In: Biryukov, A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg; 2007. vol 4593. p. 196-210. DOI: https://doi.org/10.1007/978-3-540-74619-5_13
Bogdanov. A., Knudsen, L.R., Leander, G., Paar, C., Poschmann. A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds) Cryptographic Hardware and Embedded Systems - CHES. Lecture Notes in Computer Science, vol 4727. Springer, Berlin, Heidelberg; 2007.
Majhi, S., and Mitra, P. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking. Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. IntechOpen. DOI: https://doi.org/10.5772/intechopen.102984
Moradi., A. Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In: Advances in Cryptology – EUROCRYPT, Lecture Notes in Computer Science, Springer; 2011. 6632. p. 69-88. DOI: https://doi.org/10.1007/978-3-642-20465-4_6
Surendran, S., Nassef, A., & Beheshti, B. D. A survey of cryptographic algorithms for IoT devices. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT); 2018. p. 1-8. DOI: https://doi.org/10.1109/LISAT.2018.8378034
Zhang, X.; Tang, S.; Li, T.; Li, X.; Wang, C. GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes. Electronics. 2023; 12: 405. DOI: https://doi.org/10.3390/electronics12020405
Biswas, A., Majumdar, A., Nath, S. et al. LRBC: a lightweight block cipher design for resource constrained IoT devices. J Ambient Intell Human Comput. 2023; 14: 5773–5787. DOI: https://doi.org/10.1007/s12652-020-01694-9
Roy, S., Roy, S., Biswas, A., Baishnab, K. L. LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications. KSII Transactions on Internet and Information Systems. 2021; 15(11): 4122-4144. DOI: https://doi.org/10.3837/tiis.2021.11.014
Rana, M., Mamun, Q., and Islam, R. A block cipher for resource-constrained IoT devices. World Academy of Science, Engineering and Technology. 2023; 17(3): 266-271.
Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., and Wingers, L. The SIMON and SPECK lightweight block ciphers. In: 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA; 2015. p. 1-6. DOI: https://doi.org/10.1145/2744769.2747946
Rashidi, B. Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers, ISeCure, 2023; 15(1): 137-151.
Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E. Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography; 2011, p. 146–169.
Agwa, S., Yahya, E., and Ismail, Y. Power efficient AES core for IoT constrained devices implemented in 130nm CMOS. In: IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA; 2017. p. 1-4. DOI: https://doi.org/10.1109/ISCAS.2017.8050361
Bui, D. -H., Puschini, D., Bacles-Min, S., Beigné, E., and Tran, X. -T. AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2017; 25(12): 3281-3290. DOI: https://doi.org/10.1109/TVLSI.2017.2716386
Ibrahim, N, and Agbinya, J. Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices. Applied Science. 2023; 13(7): 4398. DOI: https://doi.org/10.3390/app13074398
Thabit, F., Can, O., Aljahdali, A.O., Al-Gaphari, G.H., Alkhzaimi, H.A. Cryptography Algorithms for Enhancing IoT Security. Internet of Things. 2023; 22: 100759. DOI: https://doi.org/10.1016/j.iot.2023.100759
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.