Light Weight Cryptography for Resource Constrained IoT Devices

被引:1
|
作者
Al Shebli, Hessa Mohammed Zaher [1 ]
Beheshti, Babak D. [1 ]
机构
[1] New York Inst Technol, Old Westbury, NY 11568 USA
关键词
Light weight cryptography; IoT devices; Grain cipher; Present cipher; Hight cipher;
D O I
10.1007/978-3-030-02686-8_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is going to change the way we live dramatically. Devices like alarm clocks, lights and speaker systems can inter-connect and exchange information. Billions of devices are expected to be inter-connected by the year 2020, thus raising the alarm of a very important issue `security'. People have to be sure that their information will stay private and secure, if someone hacked into your medical device (hand watch) he will be able to view all your medical records, and he could be able to use it against you. If one device is hacked your entire network is going to be compromised. Transmitting your information securely between IoT devices using traditional crypto algorithms are not possible because those devices have limited energy supply, limited chip area and limited memory size; because of those constraints a new type of crypto algorithm came into place: the light weight crypto algorithms. As the name implies those algorithms are light and can be used in those devices with low computational power. In this paper, we start by describing some of the heavy ciphers. We also highlight some lightweight ciphers and the attacks known against them.
引用
收藏
页码:196 / 204
页数:9
相关论文
共 50 条
  • [31] ORIOT: A Source Location Privacy System for Resource Constrained IoT Devices
    Lachner, Clemens
    Rausch, Thomas
    Dustdar, Schahram
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] A Performance Evaluation of Data Protection Mechanisms for Resource Constrained IoT Devices
    Lachner, Clemens
    Dustdar, Schahram
    2019 IEEE INTERNATIONAL CONFERENCE ON FOG COMPUTING (ICFC 2019), 2019, : 47 - 52
  • [33] Light-weight cyptography for resource constrained environments
    Baier, Patrick
    Szu, Harold
    INDEPENDENT COMPONENT ANALYSES, WAVELETS, UNSUPERVISED SMART SENSORS, AND NEURAL NETWORKS IV, 2006, 6247
  • [34] Light-Weight Congestion Control in Constrained IoT Networks
    Khalek, Hussam Abdul
    Mhamdi, Lotfi
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6265 - 6270
  • [35] Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
    Pandey, Shraiyash
    Bhushan, Bharat
    WIRELESS NETWORKS, 2024, 30 (04) : 2987 - 3026
  • [36] Establishment of Light Weight Cryptography for Resource Constraint Environment using FPGA
    Baskar, Chanthini
    Balasubramaniyan, C.
    Manivannan, D.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 165 - 171
  • [37] An Optimized Point Multiplication Strategy in Elliptic Curve Cryptography for Resource-Constrained Devices
    Sabbry, Nawras H.
    Levina, Alla B.
    MATHEMATICS, 2024, 12 (06)
  • [38] Energy efficient data communication for WSN based resource constrained IoT devices
    Hudda, Shreeram
    Haribabu, K.
    Barnwal, Rishabh
    INTERNET OF THINGS, 2024, 27
  • [39] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [40] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609