Light Weight Cryptography for Resource Constrained IoT Devices

被引:1
|
作者
Al Shebli, Hessa Mohammed Zaher [1 ]
Beheshti, Babak D. [1 ]
机构
[1] New York Inst Technol, Old Westbury, NY 11568 USA
关键词
Light weight cryptography; IoT devices; Grain cipher; Present cipher; Hight cipher;
D O I
10.1007/978-3-030-02686-8_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is going to change the way we live dramatically. Devices like alarm clocks, lights and speaker systems can inter-connect and exchange information. Billions of devices are expected to be inter-connected by the year 2020, thus raising the alarm of a very important issue `security'. People have to be sure that their information will stay private and secure, if someone hacked into your medical device (hand watch) he will be able to view all your medical records, and he could be able to use it against you. If one device is hacked your entire network is going to be compromised. Transmitting your information securely between IoT devices using traditional crypto algorithms are not possible because those devices have limited energy supply, limited chip area and limited memory size; because of those constraints a new type of crypto algorithm came into place: the light weight crypto algorithms. As the name implies those algorithms are light and can be used in those devices with low computational power. In this paper, we start by describing some of the heavy ciphers. We also highlight some lightweight ciphers and the attacks known against them.
引用
收藏
页码:196 / 204
页数:9
相关论文
共 50 条
  • [1] Novel Light Weight Hardware Authentication Protocol for Resource Constrained IoT Based Devices
    Vijaykumar, V. R.
    Sekar, S. Raja
    Jothin, R.
    Diniesh, V. C.
    Elango, S.
    Ramakrishnan, S.
    IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 (31-42): : 31 - 42
  • [2] Lightweight Cryptography for Resource Constrained Devices
    Shraddha, B. H.
    Kinnal, Bhagyashree
    Wali, Heera
    Iyer, Nalini C.
    Vishal, P.
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564
  • [3] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    IEEE ACCESS, 2021, 9 : 28177 - 28193
  • [4] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    IEEE Access, 2021, 9 : 28177 - 28193
  • [5] CPOP: Cryptography process offloading proxy for resource constrained devices
    They, Yu-Shu
    Phang, Seong-Yee
    Lee, Sanggon
    Lee, HoonJae
    Lim, Hyotaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 289 - 294
  • [6] Cryptography for Privacy in a Resource-Constrained IoT: A Systematic Literature Review
    Mendoza-Cardenas F.
    Aparcana-Tasayco A.J.
    Leon-Aguilar R.S.
    Quiroz-Arroyo J.L.
    IEIE Transactions on Smart Processing and Computing, 2022, 11 (05): : 351 - 360
  • [7] Reliability and availability of IoT devices in resource constrained environments
    Tambe, Vineet
    Bansod, Gaurav
    Khurana, Soumya
    Khandekar, Shardul
    INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT, 2022, 39 (07) : 1648 - 1662
  • [8] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [9] PhotonKey: A key pairing system for IoT resource and input constrained devices using light sensors
    Gray, Dante
    Mehrnezhad, Maryam
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [10] Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
    Engels, Daniel
    Fan, Xinxin
    Gong, Guang
    Hu, Honggang
    Smith, Eric M.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 3 - +