Lightweight Cryptography for Internet of Things: A Review
DOI:
https://doi.org/10.4108/eetiot.5565Keywords:
Lightweight Cryptography, Internet of Things, IoT, Cryptography, Block Cipher, Advanced Standard Encryption, AESAbstract
The paper examines the rising significance of security in Internet of Things (IoT) applications and emphasizes the need for lightweight cryptographic solutions to protect IoT devices. It acknowledges the growing prevalence of IoT in various fields, where sensors collect data, and computational systems process it for action by actuators. Due to IoT devices' resource limitations and networked nature, security is a concern. The article compares different lightweight cryptographic block cipher algorithms to determine the best approach for securing IoT devices. It also discusses the merits of hardware versus software solutions and explores potential security threats, including intrusion and manipulation. Additionally, the article outlines future work involving the implementation of the trusted Advanced Standard Encryption block cipher in IoT devices, including its use in quick-response (QR) code scanning and messaging platforms. It acknowledges existing drawbacks and suggests areas for improvement in IoT system performance and security.
Downloads
References
Global IoT and non-IoT connections 2010–2025 (accessed on 17 august 2023), 2023.
URL https://www.statista.com/statistics/1101442/.
Georgiev, D. Internet of Things Statistics, Facts & Predictions [2023′s Update]. Available online: https://review42.com/resources/internet-of-things-stats/
Ding, J., Nemati, M., Ranaweera, C., and Choi, J. IoT Connectivity Technologies and Applications: A Survey. IEEE Access. 2020; 8: 67646-67673.
Alfred Y. Network Security. Malaysia: Asia Pacific University; 2019. pp. 5-11.
Tariq, U., Ahmed, I., Bashir, A.K., Shaukat, K. A. Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors. 2023; 23: 4117.
Caraveo-Cacep, M.A., Vázquez-Medina, R., Zavala, A.H. A survey on low-cost development boards for applying cryptography in IoT systems. Internet of Things. 2023; 22: 100743.
Majumdar, A., Laskar, N.M., Biswas, A., Sood, S.K., Baishnab, K.L. Energy efficient e-healthcare framework using HWPSO-based clustering approach. J Intell Fuzzy Syst. 2018; 36(5):1–13.
Velmurugan, T., Prakasam, P., Mohameed, V.N., Saravanan, K. Smart garbage monitoring and navigation system using IoT. Int. J. Innov. Technol. Expl. Eng. 2019; 8 (11): 3992–3996.
Mista, S., Roy, C., Mukherjee, A. Introduction to Industrial Internet of Things and Industry 4.0. 1st ed. Florida: CRC Press; 2021.
Stolojescu-Crisan, C., Crisan, C., & Butunoi, B. P. An iot based smart home automation system. Sensors. 2021; 21(11): 3784.
Abu-Tair, M., Djahel, S., Perry, P., et al. Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors. 2020; 20(21): 6131.
William, S. Cryptography and Network Security: Principles and Practice. 8th ed. London: Pearson; 2017.
Gunathilake, N. A., Buchanan, W. J., and Asif, R. Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. In: IEEE 5th World Forum on Internet of Things (WF-IoT). 2019.
Bhagat, V., Kumar, S., Gupta, S.K., Chaube, M.K. Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. Concurrency and Computation Practice and Experience. 2023; 35(10): e7425.
Silva, C., Cunha, V.A., Barraca, J.P. et al. Analysis of the Cryptographic Algorithms in IoT Communications. Inf Syst Front. 2023.
Thakor, V.A., Razzaque, M.A., and Khandaker, M.R.A. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access. 2021; 9: 28177-28193.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and Sikdar, B. A survey on iot security: Application areas, security threats, and solution architectures. IEEE Access. 2019; 7: 82721-82743.
Dutta, I. K., Ghosh, B., and Bayoumi, M.A. Lightweight Cryptography for Internet of Insecure Things : A Survey. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 2019. 475-481.
Sadkhan, S. B. and Salman, A. O. A survey on lightweight-cryptography status and future challenges. In: International Conference on Advance of Sustainable Engineering and its Application (ICASEA), Wasit - Kut, Iraq. 2018. 105-108.
Ammar, M., Russello, G., and Crispo, B. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications. 2018; 38: 8–27.
Dhanda, S. S., Singh, B. and Jindal, P. Lightweight Cryptography: A Solution to Secure IoT. Wireless Personal Communications. 2020; 112(3): 1947–1980.
Mousavi, S. K., Ghaffari, A., Besharat, S., et al. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks. 2021. 27(2): 1515-1555.
Dutta, N.S., and Chakraborty, S. A survey on implementation of lightweight block ciphers for resource constraints devices. Journal of Discrete Mathematical Sciences and Cryptography. 2020; 1–22.
Rana, M., Mamun, Q., and Islam, R. Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems. 2022; 129: 77-89.
Bhardwaj, I., Kumar, A., and Bansal, M. A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India; 2017. p. 504-509.
Okello, W.J., Liu, Q., Siddiqui, F.A. and Zhang, C. A survey of the current state of lightweight cryptography for the Internet of things. In: International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, China; 2017. p. 292-296.
Wei, Y., Xu, P., and Rong, Y. Related-key impossible differential cryptanalysis on lightweight cipher TWINE. J Ambient Intell Human Comput. 2019; 10(2): 509–517.
Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. 2017; 1–18.
Yu, W., and Kose, S. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks. IEEE Transactions on Circuits and Systems I: Regular Papers. 2017; 64(11) : 2934-2944.
Jithendra, K. B. and Shahana, T.K. New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192. International Conference On Advances in Communication and Computing Technology (ICACCT), Sangamner, India; 2018. p. 1-5.
Pammu, A. A., Chong, K. -S., Ho, W.-G., and Gwee, B. -H. Interceptive side channel attack on AES-128 wireless communications for IoT applications. In: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Jeju, Korea (South); 2016. p. 650-653.
Zhu, L., Wang, Y., and Li, R. Efficient differential fault analysis attacks to AES decryption for low ost sensors in IoTs. In: IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, Canada; 2016. p. 554-557.
Reyhani-masoleh, A., Taha, M., and Ashmawy, D. New Area Record for the AES Combined S-box / Inverse S-box. In: IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, USA; 2018. p. 145-152.
Shah, T., Haq, T. U., Farooq, G. Serpent Algorithm: An improvement by 4 × 4 S - box from finite Chain ring. In: International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan; 2018. p. 1-6.
Parikh, P., and Narkhede, S. High performance implementation of mixing of column and inv-mixing of column for AES on FPGA. In: International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), Melmaruvathur, India; 2016. p. 174-179.
Li, H., and Friggstad, Z. An efficient architecture for the AES mix columns operation. In: IEEE International Symposium on Circuits and Systems (ISCAS), Kobe; 2005. vol 5. p. 4637-4640.
Banik, S., Bogdanov, A., and Regazzoni, F. Exploring Energy Efficiency of Lightweight Block Ciphers. In: Dunkelman, O., Keliher, L. (eds) Selected Areas in Cryptography – SAC, Lecture Notes in Computer Science, Springer; 2015. vol 9566.
Zhao, W., Ha, Y., and Alioto, M. AES architectures for minimum energy operation and silicon demonstration in 65nm with lowest energy encryption. In: IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal; 2015. p. 2349-2352.
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and Iwata, T. The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (eds) Fast Software Encryption. FSE Lecture Notes in Computer Science, Springer, Berlin, Heidelberg; 2007. vol 4593.
Kim, B., Cho, J., Choi, B., Park, J., Seo, H. Compact Implementations of HIGHT Block Cipher on IoT Platforms. Security and Communication Networks. 2019; 5323578: 1-10.
Leander, G., Paar, C., Poschmann, A., Schramm, K. New Lightweight DES Variants. In: Biryukov, A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg; 2007. vol 4593. p. 196-210.
Bogdanov. A., Knudsen, L.R., Leander, G., Paar, C., Poschmann. A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds) Cryptographic Hardware and Embedded Systems - CHES. Lecture Notes in Computer Science, vol 4727. Springer, Berlin, Heidelberg; 2007.
Majhi, S., and Mitra, P. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking. Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. IntechOpen.
Moradi., A. Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In: Advances in Cryptology – EUROCRYPT, Lecture Notes in Computer Science, Springer; 2011. 6632. p. 69-88.
Surendran, S., Nassef, A., & Beheshti, B. D. A survey of cryptographic algorithms for IoT devices. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT); 2018. p. 1-8.
Zhang, X.; Tang, S.; Li, T.; Li, X.; Wang, C. GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes. Electronics. 2023; 12: 405.
Biswas, A., Majumdar, A., Nath, S. et al. LRBC: a lightweight block cipher design for resource constrained IoT devices. J Ambient Intell Human Comput. 2023; 14: 5773–5787.
Roy, S., Roy, S., Biswas, A., Baishnab, K. L. LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications. KSII Transactions on Internet and Information Systems. 2021; 15(11): 4122-4144.
Rana, M., Mamun, Q., and Islam, R. A block cipher for resource-constrained IoT devices. World Academy of Science, Engineering and Technology. 2023; 17(3): 266-271.
Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., and Wingers, L. The SIMON and SPECK lightweight block ciphers. In: 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA; 2015. p. 1-6.
Rashidi, B. Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers, ISeCure, 2023; 15(1): 137-151.
Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E. Twine: a lightweight, versatile block cipher. In: ECRYPT workshop on lightweight cryptography; 2011, p. 146–169.
Agwa, S., Yahya, E., and Ismail, Y. Power efficient AES core for IoT constrained devices implemented in 130nm CMOS. In: IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA; 2017. p. 1-4.
Bui, D. -H., Puschini, D., Bacles-Min, S., Beigné, E., and Tran, X. -T. AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2017; 25(12): 3281-3290.
Ibrahim, N, and Agbinya, J. Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices. Applied Science. 2023; 13(7): 4398.
Thabit, F., Can, O., Aljahdali, A.O., Al-Gaphari, G.H., Alkhzaimi, H.A. Cryptography Algorithms for Enhancing IoT Security. Internet of Things. 2023; 22: 100759.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things

This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 4.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.
