Total views : 748

Analysis of Lightweight Cryptographic Solutions for Internet of Things

Affiliations

  • Lovely Professional University, Jalandhar - 144411, Punjab, India

Abstract


Internet of Things (IoT) enables physical things to communicate, compute and take decisions based on any network activity. This calls for a secure solution for communication among heterogeneous devices. With the development in Information and Communication Technology (ICT), a unique impact of smart things is observed in our everyday life. IoT can consider users that interact in heterogeneous environment. In heterogeneous environment motive of each user in IoT can be different in form of communication and computation and is difficult to be judged. A malicious user can destroy the security and privacy of the network. This study gives a detailed analysis of existing security solutions for IoT. Firstly, a comparison of lightweight cryptography algorithms is made on basis of block size, key size, number of rounds, and probable attacks. Later, the various security issues in IoT are discussed along with possible solution. Security solutions in IoT will improve the trust over IoT. A secure solution that will require less computational power and is less vulnerable to existing attacks is desired.

Keywords

Internet of Things (IoT), Lightweight Algorithms, Radio Frequency Identification (RFID), Wireless Sensor Networks (WSN).

Full Text:

 |  (PDF views: 2922)

References


  • European Comission. Internet of Things in a Roadmap for the Future. 2008. p. 1-32.
  • Bojanova I, Hurlburt G, Voas J. Imagineering an Internet of Anything. Computer (Long Beach Calif). 2014; 47(6):72–7.
  • Kim I, Back M, Yim H, Lee K. RFID adaptor for detecting and handling data events in Internet of Things. Indian Journal of Science and Technology. 2015; 8(5):140-8.
  • Parks R, Pennsylvania T. RFID privacy issues in healthcare: Exploring the Roles of Technologies and Regulations. 2010; 6(3):1–24.
  • Xu B, Liu Y, He X, Tao Y. On the architecture and address mapping mechanism of IoT. IEEE International Conference on Intelligent Systems Knowledge Engineering; 2010. p. 678–82.
  • Mattern F, Floerkemeier C. From the internet of computers to the internet of things. Lecture Notes on Computer Science (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). Vol. 6462. 2010. p. 242–59.
  • Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Comput Networks. 2002; 38(4):393–422.
  • Alcaraz C, Najera P, Lopez J, Roman R. Wireless sensor networks and the Internet of Things: Do we need a complete integration? 1st International Workshop on the Security of the Internet of Things; 2010. p. 1–8.
  • Khan R, Khan SU, Zaheer R, Khan S. Future internet: The Internet of Things architecture, possible applications and key challenges. 10th International Conference on Frontiers of Information Technology; 2012. p. 257–60.
  • Wu M, Lu T, Ling F, Sun J, Du H. Research on the architecture of Internet of Things. 3rd International Conference on Advanced Computer Theory and Engineering; 2010. p. 484–7.
  • Weber RH. Internet of Things – New security and privacy challenges. Comput Law Secur Rev. 2010; 26(1):23–30.
  • Sicari S, Cappiello C, Pellegrini F, Miorandi D, Coen-Porisini A. A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers. 2014. p. 1–13.
  • Devadiga K. IEEE 802.15.4 and the Internet of Things. 2003. p. 4–7.
  • Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Cryptographic Hardware and Embedded Systems – CHES. Vol. 3156. 2004. p. 357–70.
  • Derbez P, Fouque PA. Exhausting demirci-seluk meet-in-the-middle attacks against reduced-round AES. International Workshop on Fast Software Encryption; 2014. p. 541–60.
  • Hong D, Sung J, Hong S, Lim J, Lee S, Koo B, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J, Chee S. HIGHT: A new block cipher suitable for low-resource device. Cryptographic Hardware and Embedded Systems – CHES. Vol. 4249. Springer; 2006. p. 46–59.
  • Lee J, Lim D. Parallel architecture for high-speed block cipher, HIGHT. International Journal of Security and its Applications. 2014; 8(2):59–66.
  • Wheeler DJ, Needham RM. TEA, a tiny encryption algorithm. Fast Softw Encryption. 1995; 1008(3):363–6.
  • Virmani D, Beniwal N, Mandal G, Talwar S. Enhanced Tiny Encryption Algorithm with Embedding (ETEA). International Journal of Computers and Technology. 2013; 7(1):1-9.
  • Bogdanov A, Knudsen L.R, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C. Present: An Ultra-Lightweight Block Cipher. Berlin Heidelb: Springer; 2007. p.0 450–66.
  • International Standard ISO/IEC Information Technology-Security Techniques. Lightweight Cryptography. 2012.
  • Nyberg K. Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 2015. p. 165-85.
  • Gawali DH. Rc5 Algorithm: Potential cipher solution for security in Wireless Body Sensor Networks (WBSN). Int J Adv Smart Sens Netw Syst. 2012; 2(3):1–7.
  • Biryukov A, Kushilevitz E. Improved cryptanalysis of RC5. Advances in Cryptology—EUROCRYPT’98. Vol. 1403. 1998. p. 85–99.
  • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978; 21(2):120–6.
  • Zhou X, Tang X. Research and implementation of RSA algorithm for encryption and decryption. Proceedings of 6th International Forum Strategic Technology (IFOST); 2011. p. 1118–21.
  • Jamgekar RS, Joshi GS. File encryption and decryption using secure RSA. Int J Emerg Sci Eng. 2013; 1(4):11-4.
  • Koblitz N. Elliptic curve cryptosystems. Math Comput. 1987; 48(177):203.
  • Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L. A Survey of lightweight-cryptography implementations. IEEE Des Test Comput. 2007; 24(6):522–33.
  • Ayuso J, Marin L, Jara A, Skarmeta A. Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN. 1st International Workshop on Security Internet Things. Tokyo, Japan; 2010. p. 1-8.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.