A Recent Review On Lightweight Cryptography in IoT
A Recent Review On Lightweight Cryptography in IoT
(I-SMAC 2017)
becoming important in day to day lifestyle such as healthcare, has not also to regenerate all private key for all users
smart grid, smart home[5], smart parking. IoT application is every attribute revocation ,it generates the only chunk of
useful to people but if the IoT system can't protect the user the private key relevant to an attribute.
data from hacker, attacks, and vulnerabilities. So the security
in IoT environment can't be neglect. Various researchers
Xuan Xia Yao et al. in [9], “A lightweight attribute-based
proposed lightweight encryption and decryption technique for
encryption scheme for the Internet of things” proposed a
secure IoT data transmission. Lightweight encryption is a
lightweight no-pairing ABE technique based on elliptic curve
junction of two terms "Light and weight”. Lightweight
cryptography. The security of this technique is based on
encryption is a sector of a classical cryptographic algorithm
ECDDH posit rather than bilinear Diffie-Hellman posit,
that is pertinent for resource constrained devices in IoT.
which can curtail the data processing overhead and
Lightweight encryption and decryption are implemented on
communication overhead.ABE technique layout just for one
platforms as well as hardware and software.
authority applications, it is not pertinent to Ubiquitous IoT
applications.
II. RELATED WORK
Mustafa Nasri et al. in [10] "FPGA-based Implementation of
elliptic curve cryptography” proposed an elliptic curve
A few kinds of existing schemes that are pertinent encryption
cryptosystem mellow by programming Spartan3E FPGA kit
technique for IoT and used for protecting data transmission in
and analyzed by implementing Elgamla encryption plan on it.
IoT are discussed here.
It contributes the same level of the security that other
Lyes Touati et al .in [6] "Cooperative Ciphertext-Policy surrogates contribute, it performs processing in less time, less
Attribute-based Encryption For the Internet of Things ” memory, fewer computations and less power consumption. It
Author present a cooperative ciphertext policy attribute-based is pertinent for resource constrained devices in the IoT.
encryption technique as alternative solutions to protecting data Hardware implementation of elliptic curve cryptography using
when data transfer over the public network from IoT end FPGA boost the system performance and a lot of protected
nodes. Deed the heterogeneous nature of the IoT to make than the software implementation.
viable the use of the CP-ABE scheme in an IoT domain, Lyes Touati et al.in [11] "Batch-BASED CP-ABE with
transfer the task from highly resource-constrained devices to Attribute Revocations Mechanism for the IoT" present a new
unconstrained one by hand over heavy operations in CP-ABE technique to reduces the complexity and the overhead, and
scheme to neighbor unconstrained nodes. The main idea does not require extra trust nodes in the system. In batch –
behind C-CP-ABE is to disburse computation of CP-ABE based mechanism that time axis is divided into intervals of the
encryption primitive, the resource–constrained object can hand same duration that is called time slots, policy access changes
over the most consuming operations to unconstrained nodes of occur only between two successive time slots. Trust node
the network. The computations of CP-ABE encryptions assigns only the vital attribute key chunks every time slot to
primitive is transposed from resource-constrained devices to grant a thing to update its private key. The procedure has to
unconstrained ones. need synchronization between all things in the system. It does
not compulsory to re-encrypt data every attribute policy
Kurniawan Nur Prasetyo ST et al.in [7] "An Implementation change. Batch-Based CP-ABE with Attribute Revocations
of Data Encryption for Internet of Things Using BLOWFISH Mechanism using time slots idea.
ALGORITHM on FPGA" Author present a blowfish
algorithm is implemented on FPGA using VHDL Lyes Touati et al .in[12]"Collaborative KP-ABE for Cloud-
programming language. Using FPGA implementation is Based Internet of Things Applications "Author proposed KP-
cheap, easy to implement, reprogrammed and high speed. ABE scheme using the computing power and storage
Reduce total encryption time, give greater throughput and not capacities of cloud server and trust node for doing
affect avalanche effect significantly computations.
Lyes Touati et al .in [8] "Efficient CP-ABE/Key Management
Nouha Oualha et al. in [13] "Lightweight Attribute-based
for IoT Applications" proposed a solution does not involve
Encryption for the Internet of Things" proposed CP-ABE
suspension ensuring access grants and revocations. Omit the
scheme using effective pre-computation techniques. The key
overhead as a result of to re-encryption and renaming
concept behind pre-computation techniques is to pre-compute
attributes and does not compulsory proxies to achieve attribute
and cache set pairs collected with commonly exorbitant
revocations, dwindle to the minimal number of chunk
cryptographic operations. Pre-computation techniques based
generated the private key and does not actuate any delay. The
on the generator, the preprocessing algorithms of the generator
author proposed a Solution with actuates zero delays and a
are executed by the hardware devices or trusted authority. The
minimal of generated secret key parts. The main idea behind
pre-computation technique reduces the cost of CP-ABE
this solution is to divide time axis into time slots with variable
encryption, the pre-computation technique used less
period, Trusted Attribute Authority has not to rename
computation and less energy drain than original schema.
attributes in order to revoke them from some users, and
Yijun Maoa et al. in [14], "Fully secure fuzzy identity-based [10] FPGA-based Less memory. Costly. Required
encryption" proposed a new FSFIBE technique to protecting Implementation Less computations, hardware
of elliptic curve Security
data transmission in IoT. FSFIBE technique is secure in the cryptography
full model without random oracles. FSFIBE technique has [11] Batch-BASED policy access changes Need
tight security reduction and a constant size of public CP-ABE with occur only between synchronization
parameters O (1).FSFIBE technique provided the property of Attribute two successive time
Revocations slots.
error-tolerance. It is more pertinent for protecting IoT .
communications. [12] KP -ABE and heavy operations Each resource
cloud servers and of the encryption constrained device
Fagen Li et al.in[15] "Secure and efficient data transmission in resource process to trusted there are at least
constrained node unconstrained assistant two trusted
the Internet of Things "Author propose a heterogeneous ring nodes and a cloud unconstrained
signcryption technique for secure communication form server. devices in its
resource constrained devices to a server over a public neighborhood
network. The heterogeneous ring signcryption technique [13] Pre-computation Encryption does not
techniques using require scalar point Storage
avows sender in IBC environment to send a message to a ECC multiplications
receiver in the PKI domain. The technique at the same time less energy
obtains confidentiality, integrity, authentication, non- consuming.
repudiation and anonymity in a sensible single step. [14] Fuzzy identity- Secure in the full Enlarge Key size
based encryption model without random
oracles
Kun-Lin Tsai et al. in [16] “TTP based High-efficient Multi- [15] Heterogeneous Confidentiality, Bilinear pairings
Key Exchange Protocol” Author proposed the third party ring signcryption Integrity,
based multi-key exchange protocol and use elliptic curve technique Authentication
encryption and decryption. Secure against five attacks (Replay [16] Multi-Key Achieves fully mutual Overhead
Exchange authentication. increasing
attack, Eavesdropping attack, Known-key attack, Protocol Using security level
Impersonation attack, Forgery attack). ECC and performance are
higher
Syed Farid Syed Adnan et al .in [17] “Timing Analysis of the [17] Lightweight 99% improvement on Suitable for some
AAβ Encryption encryption time and applications
Lightweight AAβ Encryption Scheme on Embedded Linux for Scheme improvement of 94%
Internet of Things” Author present an analysis of lightweight on decryption time for
asymmetric encryption, the AAβ (AA-Beta ) .that may be 2048-bit primes
feasible in IoT. 99% improvement on encryption time and [18] CA and gateway Safe, and it protects Mutually safe
the re-use attack and procedure,
improvement of 94% on decryption time for 2048-bit primes. middle attack
In the above table, some techniques reduce the complexity
Hague-Chung et al .in [18] “A Design of Key Agreement overhead and some reduce the processing overhead and
Scheme between Lightweight Devices in IoT Environment". communication Overhead. Some of the techniques used trust
The author proposed a protocol for low power and low
nodes in its neighborhood for doing computation operation of
speciation devices communicate using user smart devices
constrained Device.
through gateway and certificate authority. This protocol
provides protection from re-use attack and middle attack.
III. CHALLENGES
IV. CONCLUSION [12] Touati, Lyes, and Yacine Challal. "Collaborative KP-ABE for cloud-
based internet of things applications." In Communications (ICC), 2016
IEEE International Conference on, pp. 1-7. IEEE, 2016.
In this review paper, we have focused on different lightweight [13] Oualha, Nouha, and Kim Thuat Nguyen. "Lightweight Attribute-Based
encryption and decryptions technique used in IoT for secure Encryption for the Internet of Things." In Computer Communication and
data transmission. Every technique has some advantage and Networks (ICCCN), 2016 25th International Conference on, pp. 1-6.
disadvantage in IoT. Some technique required more storage IEEE, 2016.
space but fewer computations and vice versa. Then we [14] Mao, Yijun, Jin Li, Min-Rong Chen, Jianan Liu, Congge Xie, and Yiju
Zhan. "Fully secure fuzzy identity-based encryption for secure IoT
compare research status of various lightweight encryption and communications." Computer Standards & Interfaces 44 (2016): 117-
decryption in IoT. The security problem is a serious issue in 121.
IoT and it is hot research topic in IoT. [15] Li, Fagen, Zhaohui Zheng, and Chunhua Jin. "Secure and efficient data
transmission in the Internet of Things." Telecommunication Systems 62,
no. 1 (2016): 111-122.
[16] Tsai, Kun-Lin, Yi-Li Huang, Fang-Yie Leu, and Ilsun You. "TTP Based
REFERENCES High-Efficient Multi-Key Exchange Protocol." IEEE Access 4 (2016):
6261-6271.
[1] Ashton, Kevin. "That ‘internet of things’ thing." RFiD Journal 22, no. 7 [17] Adnan, Syed Farid Syed, Mohd Anuar Mat Isa, and Habibah Hashim.
(2009): 97-114 "Timing analysis of the lightweight AAβ encryption scheme on
embedded Linux for Internet of Things." In Computer Applications &
[2] Jang, Seiie, and Woontack Woo. "Ubi-UCAM: a unified context-aware Industrial Electronics (ISCAIE), 2016 IEEE Symposium on, pp. 113-
application model." In International and Interdisciplinary Conference 116. IEEE, 2016.
on Modeling and Using Context, pp. 178-189. Springer Berlin
Heidelberg, 2003. [18] Choi, Keun-Chang, and Moon-Seog Jun. "A Design of Key Agreement
Scheme Between Lightweight Devices in IoT Environment."
[3] Li, Yang, Mengting Chen, and Jian Wang. "Introduction to side-channel In International Conference on Computer Science and its Applications,
attacks and fault attacks." In Electromagnetic Compatibility (APEMC), pp. 224-229. Springer Singapore, 2016.
2016 Asia-Pacific International Symposium on, vol. 1, pp. 573-575.
IEEE, 2016.
[4] Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "A
Lightweight Trust Design for IoT Routing." In Dependable, Autonomic
and Secure Computing, 14th Intl Conf on Pervasive Intelligence and
Computing, 2nd Intl Conf on Big Data Intelligence and Computing and
Cyber Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C, pp.
552-557. IEEE, 2016.
[5] Al Salami, Sanaah, Joonsang Baek, Khaled Salah, and Ernesto Damiani.
"Lightweight Encryption for Smart Home." In Availability, Reliability
and Security (ARES), 2016 11th International Conference on, pp. 382-
388. IEEE, 2016.
[6] Touati, Lyes, Yacine Challal, and Abdelmadjid Bouabdallah. "C-cp-abe:
Cooperative ciphertext policy attribute-based encryption for the internet
of things." In Advanced Networking Distributed Systems and
Applications (INDS), 2014 International Conference on, pp. 64-69.
IEEE, 2014.
[7] Prasetyo, Kurniawan Nur, Yudha Purwanto, and Denny Darlis. "An
implementation of data encryption for Internet of Things using blowfish
algorithm on FPGA." In Information and Communication Technology
(ICoICT), 2014 2nd International Conference on, pp. 75-79. IEEE,
2014.
[8] Touati, Lyes, and Yacine Challal. "Efficient cp-abe attribute/key
management for iot applications." In Computer and Information
Technology; Ubiquitous Computing and Communications; Dependable,
Autonomic and Secure Computing; Pervasive Intelligence and
Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International
Conference on, pp. 343-350. IEEE, 2015.
[9] Yao, Xuanxia, Zhi Chen, and Ye Tian. "A lightweight attribute-based
encryption scheme for the Internet of Things." Future Generation
Computer Systems 49 (2015): 104-112.
[10] Nawari, Mustafa, Hazim Ahmed, Aisha Hamid, and Mohamed Elkhidir.
"Fpga based implementation of elliptic curve cryptography."
In Computer Networks and Information Security (WSCNIS), 2015 World
Symposium on, pp. 1-8. IEEE, 2015.
[11] Touati, Lyes, and Yacine Challal. "Batch-Based CP-ABE with attribute
revocation mechanism for the internet of things." In Computing,
Networking and Communications (ICNC), 2015 International
Conference on, pp. 1044-1049. IEEE, 2015.