A Scoping Study on Lightweight Cryptography Reviews in IoT

Main Article Content

Ikenna Rene Chiadighikaobi
Nurliza Katuk

Abstract

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC.  Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.

Article Details

How to Cite
1.
A Scoping Study on Lightweight Cryptography Reviews in IoT. Baghdad Sci.J [Internet]. 2021 Jun. 20 [cited 2024 Nov. 6];18(2(Suppl.):0989. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6218
Section
article

How to Cite

1.
A Scoping Study on Lightweight Cryptography Reviews in IoT. Baghdad Sci.J [Internet]. 2021 Jun. 20 [cited 2024 Nov. 6];18(2(Suppl.):0989. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6218

References

Rahman AFA, Daud M, Mohamad MZ. Securing sensor to cloud ecosystem using internet of things (iot) security framework. In the Proceedings of the International Conference on Internet of things and Cloud Computing. 2016. https://doi.org/10.1145 /2896387.2906198

Ratasuk R, Vejlgaard B, Mangalvedhe N, Ghosh A. NB-IoT system for M2M communication. In the 2016 IEEE wireless communications and networking conference. 2016. https://doi.org/10.1109/WCNC.2016.7564708

Agrawal N. Internet of things – Iot a new envisage in the domain of automation. Indian Journal of Computer Science and Engineering. 2019;10(1),1-7. https://doi.org/10.21817/indjcse/2019/v10i1/191001004

Caron X, Bosua R, Maynard SB, Ahmad A. The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Computer Law & Security Review. 2016;32(1),4-15. https://doi.org/10.1016/j.clsr.2015.12.001

Attié E, Meyer-Waarden L. The acceptance process of the Internet of Things: how to improve the acceptance of the IoT technology. In Smart Marketing with the Internet of Things. IGI Global. 2019;21-45. https://doi.org/10.4018/978-1-5225-5763-0.ch002

Elemam E, Bahaa-Eldin MA, Shaker HN, Sobh AM. A Secure MQTT Protocol, Telemedicine IoT Case Study. In 2019 14th International Conference on Computer Engineering and Systems. 2019; 99-105. https://doi: 10.1109/ICCES48960.2019.9068129.

Harum N, Abidin ZZ, Shah WM, Hassan A. Implementation of smart monitoring system with fall dectector for elderly using IoT technology. International Journal of Computing. 2018;17(4), 243-249. https://doi.org/10.47839/ijc.17.4.1146

Lee I, Lee K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons. 2015;4,58. https://doi.org/10.1016/j.bushor.2015.03.008.

Steane TNE, Radcliffe P. IOT status communication for home automation. International Journal of Computing. 2019;18(3),240-248. https://doi.org/ 10.1109/ccaa. 2016.7813916

Arasteh H, et al. Iot-based smart cities: A survey. In IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC). 2016;1-6. https://doi:10.1109/EEEIC.2016.7555867.

Großwindhager B, Rupp A, Tappler M, Tranninger M, Weiser S, Aichernig B, Römer KU. Dependable Internet of Things for Networked Cars. International Journal of Computing. 2017;16(4),226-237.

Baker SB, Xiang W, Atkinson I. Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access. 2017;5,26521-26544. https://doi.org/10.1109/ACCESS.2017.2775180

Dalipi F, Yayilgan SY. Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges. In 2016 4th International Conference on Future Internet of Things and Cloud Workshops. 2016; 63-68. IEEE. https://doi: 10.1109/W-FiCloud.2016.28.

Jayaraman P, Yavari A, Georgakopoulos D, Morshed A, Zaslavsky A. Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt. Sensors. 2016. https://doi.org/10.3390/s16111884.

Feroz Khan AB, Anandharaj G. AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal, In Press. 2020. https://doi.org/10.1016/j.eij.2020.05.004

Mahmoud R, Yousuf T, Aloul F, Zualkernan I. Internet of things (IoT) security: Current status challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). 2015;336-341. https://doi.org/10.1109/ICITST.2015.7412116.

Bull P, Austin R, Popov E, Sharma M, Watson R. Flow based security for IoT devices using an SDN gateway. In the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud). 2016.https://doi.org/10.1109/FiCloud.2016.30

Tsai KL, Huang YL, Leu FY, You I, Huang YL, Tsai CH. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6,45325-45334. https://doi.org/10.1109/ACCESS.2018.2852563

Gunathilake NA, Buchanan WJ, Asif R. Next generation lightweight cryptography for smart IoT devices:: implementation, challenges and applications. Paper presented at the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). 2019. https://doi.org/10.1109/WF-IoT.2019.8767250.

Mohamed NN, Mohd-Yussoff Y, Saleh MA, Hashim H. Hybrid cryptographic approach for internet of things applications: A literature review. Journal of Information and Communication Technology. 2020;19(3),279-319. https://doi.org/10.32890/jict2020.19.3.1

Mohan J, Rajesh R. Secure visual cryptography scheme with meaningful shares. Indian Journal of Computer Science and Engineering. 2020;11(2),146-160. https://doi.org/10.21817/indjcse /2020/v11i2/201102001

Arksey H, O'Malley L. Scoping studies: towards a methodological framework. International journal of social research methodology. 2005;8(1),19-32. https://doi.org/10.1080/1364557032000119616

Pham MT, Rajić A, Greig JD, Sargeant JM, Papadopoulos A, McEwen, SA. A scoping review of scoping reviews: advancing the approach and enhancing the consistency. Research synthesis methods. 2014;5(4),371-385. https://doi.org/10.1002/jrsm.1123

Kushwaha PK, Singh M, Kumar P. A survey on lightweight block ciphers. International Journal of Computer Applications. 2014;96(17). https://doi.org/10.5120/16883-6923

Kong HJ, Ang L, Seng PK. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments. Journal of Network and Computer Applications. 2015;49,15-50. https://doi.org/10.1016/j.jnca.2014.09.006.

Mohd BJ, Hayajneh T, Vasilakos AV. A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications. 2015;58,73-93. https://doi.org/10.1016/j.jnca.2015.09.001

Manifavas C, Hatzivasilis G, Fysarakis K, Papaefstathiou Y. A survey of lightweight stream ciphers for embedded systems. Security And Communication Networks. 2015;9,1226-1246. https://doi.org/.1002/sec.1399.

Hosseinzadeh J, Hosseinzadeh M. A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation. Advances in Computer Science: an International Journal. 2016;5(4),31-41.

Younis M, Abdulkareem M. A Survey oF RFID Authentication Protocols. Information Security. 2016;6, 1-12. https://doi.org/10.1109/ICCIT.2008.314

Singh S, Sharma PK, Moon S. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. (2017). https://doi.org/10.1007/s12652-017-0494-4

Bhardwaj I, Kumar A, Bansal M. A review on lightweight cryptography algorithms for data security and authentication in IoTs. In 4th International Conference on Signal Processing Computing and Control (ISPCC). 2017;504-509. https://doi.org/10.1109/ISPCC.2017.8269731.

Buchanan WJ, Li, S, Asif R. Lightweight cryptography methods. Journal of Cyber Security Technology. 2017;1(3-4),187-201. https://doi.org/10.1080/23742917.2017.1384917

Okello WJ, Liu Q, Siddiqui FA, & Zhang C. A survey of the current state of lightweight cryptography for the Internet of things. In the 2017 International Conference on Computer, Information and Telecommunication Systems (CITS). 2017. https://doi.org/10.1109/CITS.2017. 8035317

Philip MA. A survey on lightweight ciphers for IoT devices. In 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy). 2017;1-4. https://doi.org/10.1109/TAPENERGY.2017.8397271

Biryukov A, Perrin LP. State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive. 2017. https://eprint.iacr.org/2017/511.pdf

Bansal S, Verma N. Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things: A Review. International Journal of Engineering Research & Technology (IJERT). 2017;5(11),1-4. https:// doi: 10.1007/978-3-319-69155-8_6

Orúe AB, Encinas LH, Fernández V, Montoya F. A review of cryptographically secure PRNGs in constrained devices for the IoT. In the International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain. 2017. https://doi. org/10.4018/978-1-5225-5742-5.ch003

Kaur J, Sidhu BK. A Survey on Lightweight Block Ciphers for Wireless Sensor Network. International Journal of Advanced Research in Computer Science. 2017;8(5). https://doi.or g/10.26483/ijarcs.v8i5.3907

Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M. Elliptic curve lightweight cryptography: A survey. IEEE Access, 20186, 72514-72550. https://doi.org/10.1109/ACCESS.2018.2881444

Surendran S, Nassef A, Beheshti BD. A survey of cryptographic algorithms for IoT devices. In 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT). 2018;1-8. https://doi.org/10.1109/LISAT.2018.8378034

Sadkhan SB, Salman AO. A survey on lightweight-cryptography status and future challenges. In the 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA). 2018. https://doi.org/10.1109/ICASEA.2018.8370965

Sehrawat D, Gill NS. Lightweight block ciphers for IoT based applications: A review. International Journal of Applied Engineering Research. 2018;13(5),2258-2270. https://doi.org /10.1049/pbse009e_ch7

Hussain R, Abdullah I. Review of different encryption and decryption techniques used for security and privacy of IoT in different applications. In the 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE). 2018. https://doi.org/ 10.1109/SEGE.2018.8499430

Pawar SV, Pattanshetti T. Lightweight-cryptography: a survey. International Research Journal of Engineering and Technology (IRJET). 2018;5(05). https://www.irjet.net/archives/V5/i5/IRJET-V5I5752.pdf

Sallam S, Beheshti BD. A survey on lightweight cryptographic algorithms. In the TENCON 2018-2018 IEEE Region 10 Conference. 2018. https://doi.org/10.1109/ TENCON.2018.8650352

Mustafa G, Ashraf R, Mirza MA, Jamil A. A review of data security and cryptographic techniques in IoT based devices. In the Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. 2018. https://doi.org/10.1145 /3231053.3231100

Chauhan B, Borikar S, Aote S, Katankar V. A Survey on Image Cryptography Using Lightweight Encryption Algorithm. International Journal of Scientific Research in Science, Engineering and Technology. 2018;4(4),344-347. http://ijsrset.com/paper/3976.pdf

Carracedo J, Milliken M, Chouhan P, Scotney B, Lin Z, Sajjad A, Shackleton M. Cryptography for Security in IoT. In 2018 Fifth International Conference on Internet of Things: Systems, management and Security. IEEE. 2018;23-30. https://doi.org /10.1109/IoTSMS.2018.8554634

Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., & Manifavas, C. (). A review of lightweight block ciphers. Journal of Cryptographic Engineering. 2018;8(2),141-184. https://doi.or g/10.1007/s13389-017-0160-y

Bokhari M, Hassan S. A comparative study on lightweight cryptography. In Cyber Security. Springer, Singapore. 2018;69-79. https://doi.org/10.1109/ICCES48766.2020.9137984

Dinu D, Le Corre Y, Khovratovich D, Perrin L, Großschädl J, Biryukov A. Triathlon of lightweight block ciphers for the internet of things. Journal of Cryptographic Engineering. 2019;9(3),283-302. https://doi.org/10.1007/s13389-018-0193-x

Shah A, Engineer M. A survey of lightweight cryptographic algorithms for iot-based applications. Smart Innovations in Communication and Computational Sciences. Springer. 2019;283-293. https://doi.org/10.1007/978-981-13-2414-7_27

Dutta IK, Ghosh B, Bayoumi M. Lightweight Cryptography for Internet of Insecure Things: A Survey. In the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 2019. https://doi.org/10.1109/CCWC.2019.8666557

Beg A, Al-Kharobi T, Al-Nasser A. Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment. In 2nd International Conference on Computer Applications & Information Security (ICCAIS). 2019;1-6, https://doi: 10.1109/CAIS.2019.8769509.

Shahbodin F, Azni HA, Tasnuva A, Mohd KCNKC. Lightweight cryptography techniques for MHealth cybersecurity. In Proc. 2019 Asia Pacific Information Technology Conference. 2019;44-50. https://doi.org/10.1145/3314527.3314536

Rana S. A Survey Paper of Lightweight Block Ciphers Based on Their Different Design Architectures and Performance Metrics. International Journal of Computer Engineering and Information Technology. 2019;11(6),119-129.

Singh A, Singh S, Singh G. Lightweight Ciphers for Internet of things: A Survey. International Journal of Innovative Technology and Exploring Engineering. 2019;8(7),1973-1981. https://1library.net/document/eqo075kq-lightweight-ciphers-for-internet-of-things-a-survey.html

Masoodi IS, Javid, B. A Review of Cryptographic Algorithms for the Internet of Things. In Cryptographic Security Solutions for the Internet of Things. IGI Global. 2019;67-93. DOI: 10.4018/978-1-5225-5742-5.ch003

Malik M, Dutta M, Granjal J. A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things. IEEE Access. 2019;7,27443-27464. https://doi.or g/10.1109/ACCESS.2019.2900957.

Kousalya R, Kumar G. A Survey of Light-Weight Cryptographic Algorithm for Information Security and Hardware Efficiency In Resource Constrained Devices. In 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). 2019;1-5. https://doi:10.1109/ViTECoN.2019.8899376

Syal R. A Comparative Analysis of Lightweight Cryptographic Protocols for Smart Home. Emerging Research in Computing, Information, Communication and Applications. Springer. 2019;663-660. https://doi.org/10.1007/978-981-13-5953-8_54

Patil A, Banerjee S, Borkar G. A Survey on Securing Smart Gadgets Using Lightweight Cryptography. In the Proceedings of International Conference on Wireless Communication. 2002. https://doi.org/10.1007/978-981-15-1002-1_51

Dhanda SS, Singh B, Jindal P. Lightweight Cryptography: A Solution to Secure IoT. Wireless Pers Commun. 2002;112,1947–1980. https://doi.org/10.1007/s11277-020-07134-3

Katz J, Lindell Y. Introduction to modern cryptography: Chapman and Hall/CRC. 2014. https://doi.org/10.3390/s16111884.

Stallings W. Network and internetwork security: principles and practice (Vol. 1): Prentice Hall Englewood Cliffs, NJ. 1995. https://dl.acm.org/doi/book/10.5555/193189

Ahmad JI, Din R, Ahmad M. Analysis Review on Public Key Cryptography Algorithms. International Journal of Electrical and Computer Engineering (IJECE). 2018;12(2),447-454. http://doi.org/10.11591/ijeecs.v12.i2.pp447-454

Ghazali TK, Zakaria NH. Security performance evaluation of biometric lightweight encryption for fingerprint template protection. International Journal of Advanced Computer Research. 2019;9,43. https://doi.org/10.19101/IJACR.PID49

Venugopal P, Viji K. Applying Empirical Thresholding Algorithm For A Keystroke Dynamics Based Authentication System. Journal Of Information And Communication Technology. 2019;18(4),383-413. doi:10.32890/jict2019.18.4.1

Grant MJ, Booth A. A typology of reviews: an analysis of 14 review types and associated methodologies. Health Information & Libraries Journal. 2009;26(2),91-108. https://doi.org/10.1111/j.1471-1842.2009.00848.x

Similar Articles

You may also start an advanced similarity search for this article.