Skip to main content

Lightweight Encryption Algorithms, Technologies, and Architectures in Internet of Things: A Survey

  • Chapter
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 103))

  • 878 Accesses

Abstract

Internet of things is a fast-growing field of industry as a lot of IoT applications are introduced in the market. Its popularity is also growing because of its ease of use and its applications serving in vast domains. The demand for IoT deployment over a large scale is increasing at a swift pace. A lot of issues and challenges have worked on, and a lot remains to be explored and solved. It has become a focus of research. A considerable number of researches have contributed a lot in the field of IoT. However, still it is lagging in the security domain, so is the reason for concern for many researchers. There are few other concerns in IoT which are related to the security goals, requirements, challenges, and issues. This paper provides an overview of IoT along with presenting various privacy and security issues in it. The paper also shows how the security in IoT differs from the security in conventional systems. Various lightweight encryption techniques for IoT, limitations of IoT, IoT technologies, and architectures are discussed and compared in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  2. Whitmore A, Agarwal A, Da Xu L (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17(2):261–274

    Article  Google Scholar 

  3. Horrow S, Sardana A (2012) Identity management framework for cloud based internet of things. In: Proceedings of the first international conference on security of internet of things. ACM, pp 200–203

    Google Scholar 

  4. Mansfield-Devine S (2016) Securing the internet of things. Comput Fraud Secur 2016(4):15–20

    Article  Google Scholar 

  5. Lu C (2014) Overview of security and privacy issues in the internet of things. Washington University

    Google Scholar 

  6. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering, vol 3. IEEE, pp 648–651

    Google Scholar 

  7. Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, pp 663–667

    Google Scholar 

  8. Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE, pp 32–37

    Google Scholar 

  9. Trappe W, Howard R, Moore RS (2015) Low-energy security: Limits and opportunities in the internet of things. IEEE Secur Priv 13(1):14–21

    Article  Google Scholar 

  10. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J 4(5):1250–1258

    Article  Google Scholar 

  11. Shafagh H, Hithnawi A, Dröscher A, Duquennoy S, Hu W (2015) Poster: towards encrypted query processing for the internet of things. In: Proceedings of the 21st annual international conference on mobile computing and networking. ACM, pp 251–253

    Google Scholar 

  12. Kotamsetty R, Govindarasu M (2016) Adaptive latency-aware query processing on encrypted data for the internet of things. In: 2016 25th international conference on computer communication and networks (ICCCN). IEEE, pp 1–7

    Google Scholar 

  13. Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media

    Google Scholar 

  14. Wheeler DJ, Needham RM (1994) TEA, a tiny encryption algorithm. In: International workshop on fast software encryption. Springer, pp 363–366

    Google Scholar 

  15. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 1–18

    Google Scholar 

  16. Rivest RL (1994) The RC5 encryption algorithm. In: International workshop on fast software encryption. Springer, pp 86–96

    Google Scholar 

  17. Sarkar S (2014) Small secret exponent attack on RSA variant with modulus. Des Codes Crypt 73(2):383–392

    Article  MathSciNet  Google Scholar 

  18. Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1998) Twofish: A 128-bit block cipher. NIST AES Propos 15(1):23–91

    Google Scholar 

  19. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112

    Article  Google Scholar 

  20. Yang Y, Zheng X, Tang C (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37

    Article  Google Scholar 

  21. Baskar C, Balasubramaniyan C, Manivannan D (2016) Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Comput Sci 78:165–171

    Article  Google Scholar 

  22. Al Salami S, Baek J, Salah K, Damiani E (2016) Lightweight encryption for smart home. In: 2016 11th international conference on availability, reliability and security (ARES). IEEE, pp 382–388

    Google Scholar 

  23. Liang C, Ye N, Malekian R, Wang R (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: 2016 2nd international symposium on agent, multi-agent systems and robotics (ISAMSR). IEEE, pp 160–166

    Google Scholar 

  24. Fugkeaw S, Sato H (2016) Improved lightweight proxy re-encryption for flexible and scalable mobile revocation management in cloud computing. In: 2016 IEEE 9th international conference on cloud computing (CLOUD). IEEE, pp 894–899

    Google Scholar 

  25. Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Futur Gener Comput Syst 72:239–249

    Article  Google Scholar 

  26. Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95–108

    Article  Google Scholar 

  27. Baharon MR, Shi Q, Llewellyn-Jones D (2015) A new lightweight homomorphic encryption scheme for mobile cloud computing. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 618–625

    Google Scholar 

  28. Zegers W, Chang SY, Park Y, Gao J (2015) A lightweight encryption and secure protocol for smartphone cloud. In: 2015 IEEE symposium on service-oriented system engineering. IEEE, pp 259–26

    Google Scholar 

  29. Sahraoui S, Bilami A (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Comput Netw 91:26–45

    Article  Google Scholar 

  30. Aazam M, St-Hilaire M, Lung CH, Lambadaris I (2016) PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 12–17

    Google Scholar 

  31. Jiang H, Shen F, Chen S, Li KC, Jeong YS (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141

    Article  Google Scholar 

  32. Bose T, Bandyopadhyay S, Ukil A, Bhattacharyya A, Pal A (2015) Why not keep your personal data secure yet private in IoT? Our lightweight approach. In: 2015 IEEE tenth international conference on intelligent sensors, sensor networks and information processing (ISSNIP). IEEE, pp 1–6

    Google Scholar 

  33. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  34. Chakrabarty S, Engels DW (2016) A secure IoT architecture for smart cities. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 812–813

    Google Scholar 

  35. Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J et al (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459

    Article  Google Scholar 

  36. Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094

    Article  Google Scholar 

  37. Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16

    Article  Google Scholar 

  38. Medagliani P, Leguay J, Duda A, Rousseau F, Duquennoy S, Raza S et al (2014) Internet of things applications-from research and innovation to market deployment. The River Publishers

    Google Scholar 

  39. Valdivieso Caraguay AL, Benito Peral A, Barona Lopez LI, Garcia Villalba LJ (2014) SDN: Evolution and opportunities in the development IoT applications. Int J Distrib Sens Netw 10(5):735142

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rishabh, Sharma, T.P. (2020). Lightweight Encryption Algorithms, Technologies, and Architectures in Internet of Things: A Survey. In: Saini, H., Sayal, R., Buyya, R., Aliseri, G. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 103. Springer, Singapore. https://doi.org/10.1007/978-981-15-2043-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2043-3_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2042-6

  • Online ISBN: 978-981-15-2043-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics