A review on lightweight cryptography algorithms for data security and authentication in IoTs

Internet of Things (IoTs) comprises of a cluster of resource constrained devices, sensors and machines connected with each other and communicating over the internet. Due to frequent exchange of confidential data over the internet, IoTs become susceptible to various attacks (such as eavesdropping, denial of service, fabrication attacks) and to resolve these attacks security is required. In this paper, a brief discussion on the various IoT applications and architectures has been done. Further, the security concerns regarding information sharing and attacks have been highlighted. To overcome from these attacks safety measures regarding data security and authentication are discussed in detail resulting in use of cryptography as a solution. The comparative analysis of various lightweight encryption and authentication algorithms is carried out. The comparative analysis results show that the lightweight algorithms have good performance as compared to conventional cryptography algorithm in terms of memory requirement, their operations, and power consumption. Also, some research directions defined in which further work can be done on lightweight cryptography algorithms.

[1]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[2]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[3]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[4]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[5]  Muhammad Babar,et al.  Applications and Challenges Faced by Internet of Things - A Survey , 2016 .

[6]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[7]  Isha,et al.  Analysis of Lightweight Cryptographic Solutions for Internet of Things , 2016 .

[8]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[9]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[10]  Noen Given RECTANGLE : A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms , 2015 .

[11]  Prabhat Kumar,et al.  A Survey on Lightweight Block Ciphers , 2014 .

[12]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[13]  Matt Henricksen,et al.  EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption , 2011, CANS.

[14]  Dindayal Mahto,et al.  Security Analysis of Elliptic Curve Cryptography and RSA , 2016 .

[15]  Toru Akishita,et al.  Very Compact Hardware Implementations of the Blockcipher CLEFIA , 2011, Selected Areas in Cryptography.

[16]  Christof Paar,et al.  Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.

[17]  H. K. Srivastava,et al.  Performance Based Comparison Study of RSA and Elliptic Curve Cryptography , 2013 .

[18]  Akashi Satoh,et al.  Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES , 2003, ISC.

[19]  Jason Smith,et al.  The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[20]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[21]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[22]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[23]  Kyoji Shibutani,et al.  The 128-Bit Blockcipher CLEFIA (Extended Abstract) , 2007, FSE.

[24]  Sanjay Bhargava,et al.  Analysis of Cryptographic Algorithms for Network Security , 2013 .

[25]  Ramjee Prasad,et al.  Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges , 2010, CNSA.

[26]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.

[27]  O. Saeed,et al.  Towards Internet of Things: Survey and Future Vision , 2013 .

[28]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2015, Inf. Syst. Frontiers.

[29]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[30]  Qinghan Xiao,et al.  RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .

[31]  Jongsung Kim,et al.  HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.