A Review of Cryptographic Algorithms for the Internet of Things

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions. A Review of Cryptographic Algorithms for the Internet of Things

[1]  Marlin H. Mickle,et al.  Exploring Energy Efficient Architectures in Passive Wireless Nodes for IoT Applications , 2014, IEEE Circuits and Systems Magazine.

[2]  Naixue Xiong,et al.  Energy Efficiency QoS Assurance Routing in Wireless Multimedia Sensor Networks , 2011, IEEE Systems Journal.

[3]  Hasan Farooq,et al.  Energy, Traffic Load, and Link Quality Aware Ad Hoc Routing Protocol for Wireless Sensor Network Based Smart Metering Infrastructure , 2013, Int. J. Distributed Sens. Networks.

[4]  Guang Gong,et al.  Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices , 2010, Financial Cryptography Workshops.

[5]  Arunabha Sen,et al.  Relay node placement in large scale wireless sensor networks , 2006, Comput. Commun..

[6]  Konstantinos Kalpakis,et al.  Topology-aware placement and role assignment for energy-efficient information gathering in sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[7]  Prabhat Kumar,et al.  A Survey on Lightweight Block Ciphers , 2014 .

[8]  Christof Paar,et al.  New Lightweight DES Variants , 2007, FSE.

[9]  Lars C. Wolf,et al.  Undervolting in WSNs: Theory and Practice , 2015, IEEE Internet of Things Journal.

[10]  Mohamed Younis,et al.  Performance evaluation of load-balanced clustering of wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[11]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.

[12]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.

[13]  Taufik Abrão,et al.  WDM/OCDM Energy-Efficient Networks Based on Heuristic Ant Colony Optimization , 2016, IEEE Systems Journal.

[14]  R. M. Chandrasekaran,et al.  Role of relay node in Wireless Sensor Network: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[15]  Minyi Guo,et al.  Real-Time Locating Systems Using Active RFID for Internet of Things , 2016, IEEE Systems Journal.

[16]  Jie Jia,et al.  On the Problem of Energy Balanced Relay Sensor Placement in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[17]  Hai Jin,et al.  Energy Conservation in Progressive Decentralized Single-Hop Wireless Sensor Networks for Pervasive Computing Environment , 2017, IEEE Systems Journal.

[18]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[19]  Hideki Imai,et al.  On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses , 1989, CRYPTO.

[20]  Lusheng Wang,et al.  Relay sensor placement in wireless sensor networks , 2008, Wirel. Networks.

[21]  S. Venkatesan,et al.  Energy efficient sensor, relay and base station placements for coverage, connectivity and routing , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[22]  Errol L. Lloyd,et al.  Relay Node Placement in Wireless Sensor Networks , 2011, IEEE Transactions on Computers.

[23]  Shau-Yin Tseng,et al.  Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[24]  Noel Crespi,et al.  The Internet of Things - Concept and Problem Statement , 2012 .

[25]  Pravin Varaiya,et al.  Optimal Placement of Relay Nodes for Energy Efficiency in Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[26]  Jongsung Kim,et al.  HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.

[27]  Krishnendu Chakrabarty,et al.  Sensor placement for effective coverage and surveillance in distributed sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[28]  Chen-Nee Chuah,et al.  Energy-aware node placement in wireless sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[29]  Xiaoning Zhang,et al.  Power-Efficient Provisioning for Online Virtual Network Requests in Cloud-Based Data Centers , 2015, IEEE Systems Journal.

[30]  Lida Xu,et al.  An Integrated System for Regional Environmental Monitoring and Management Based on Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[31]  Jianping Pan,et al.  Topology control for wireless sensor networks , 2003, MobiCom '03.

[32]  Fei Tao,et al.  IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing , 2014, IEEE Transactions on Industrial Informatics.