Open Access

A Survey on Lightweight Cryptographic Algorithms in IoT


Cite

1. Thakor, V. A., M. A. Razzaque, M. R. A. Khandaker. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. – IEEE Access: Practical Innovations, Open Solutions, Vol. 9, 2021, pp. 28177-28193.Search in Google Scholar

2. Hatzivasilis, G., K. Fysarakis, I. Papaefstathiou, C. Manifavas. A Review of Lightweight Block Ciphers. – Journal of Cryptographic Engineering, Vol. 8, 2018, No 2, pp. 141-184.Search in Google Scholar

3. Dhanda, S. S., B. Singh, P. Jindal. Lightweight Cryptography: A Solution to Secure IoT. – Wireless Personal Communications. 2020, pp. 1947-1980.Search in Google Scholar

4. Alazzam, H., O. AbuAlghanam, Q. M. Al-zoubi, A. Alsmady, E. Alhenawi. A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 146-160.Search in Google Scholar

5. Khan, M. N., A. Rao, S. Camtepe. Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. – IEEE Internet of Things Journal, Vol. 8, 2021, No 6, pp. 4132-4156.Search in Google Scholar

6. Sallam, S., B. D. Beheshti. A Survey on Lightweight Cryptographic Algorithms. – In: Proc. of IEEE Region 10 Conference (TENCON’18), IEEE, 2018.Search in Google Scholar

7. Julian Okello, W., Q. Liu, F. Ali Siddiqui, C. Zhang. A Survey of the Current State of Lightweight Cryptography for the Internet of Things. – In: Proc. of International Conference on Computer, Information and Telecommunication Systems (CITS’17), 2017, pp. 292-296.Search in Google Scholar

8. Nayancy, D. S., S. Chakraborty. A Survey on Implementation of Lightweight Block Ciphers for Resource Constraints Devices. – Journal of Discrete Mathematical Sciences & Cryptography, Vol. 2020, pp. 1-22.Search in Google Scholar

9. Singh, S., P. K. Sharma, S. Y. Moon, J. H. Park. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions. – Journal of Ambient Intelligence and Humanized Computing, 2017.Search in Google Scholar

10. Mousavi, S. K., A. Ghaffari, S. Besharat, H. Afshari. Security of Internet of Things Based on Cryptographic Algorithms: A Survey. – Wireless Networks, Vol. 27, 2021, No 2, pp. 1515-1555.Search in Google Scholar

11. Mustafa, G., R. Ashraf, M. Mirza, A. Jamil, A. Muhammad. A Review of Data Security and Cryptographic Techniques in IoT Based Devices. – In: Proc. of 2nd International Conference on Future Networks and Distributed Systems, ACM, New York, NY, USA, 2018.Search in Google Scholar

12. Fotovvat, A., G. M. E. Rahman, S. S. Vedaei, K. A. Wahid. Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes. – IEEE Internet of Things Journal, Vol. 8, 2021, No 10, pp. 8279-8290.Search in Google Scholar

13. Sudha, K. S., N. Jeyanthi. A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT). – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 50-72.Search in Google Scholar

14. Bhardwaj, I., A. Kumar, M. Bansal. A Review on Lightweight Cryptography Algorithms for Data Security and Authentication in IoTs. – In: Proc. of 4th International Conference on Signal Processing, Computing and Control (ISPCC’17), IEEE, 2017.Search in Google Scholar

15. Surendran, S., A. Nassef, B. D. Beheshti. A Survey of Cryptographic Algorithms for IoT Devices. – In: Proc. of IEEE Long Island Systems, Applications, and Technology Conference (LISAT’18), IEEE, 2018.Search in Google Scholar

16. Goyal, T. K., V. Sahula, D. Kumawat. Energy Efficient Lightweight Cryptography Algorithms for IoT Devices. – IETE Journal of Research, Vol. 2019, pp. 1-14.Search in Google Scholar

17. Dutta, I. K., B. Ghosh, M. Bayoumi. Lightweight Cryptography for Internet of Insecure Things: A Survey. – In: Proc. of 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC’19), IEEE, 2019.Search in Google Scholar

18. Gunathilake, N. A., W. J. Buchanan, R. Asif. Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. – In: Proc. of 5th IEEE World Forum on Internet of Things (WF-IoT’19), IEEE, 2019.Search in Google Scholar

19. Gunathilake, N. A., A. Al-Dubai, W. J. Buchana. Recent Advances and Trends in Lightweight Cryptography for IoT Security. – In: Proc. of 16th International Conference on Network and Service Management (CNSM’20), IEEE, 2020.Search in Google Scholar

20. Dai, Y., S. Chen. Cryptanalysis of Full PRIDE Block Cipher. – Science China Information Sciences, Vol. 60, 2017, No 5.Search in Google Scholar

21. Zhao, J., X. Wang, M. Wang, X. Dong. Differential Analysis on Block Cipher PRIDE. – In: Cryptology ePrint Archive. Vol. 2014.Search in Google Scholar

22. Yang, Q., L. Hu, S. Sun, K. Qiao, L. Song, J. Shan, X. Ma. Improved Differential Analysis of Block Cipher PRIDE. Information Security Practice and Experience. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2015, pp. 209-219.Search in Google Scholar

23. Lallemand, V., S. Rasoolzadeh. Differential Cryptanalysis of 18-Round PRIDE. Lecture Notes in Computer Science. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2017, pp. 126-146.Search in Google Scholar

24. Hou, X., J. Breier, F. Zhang, Y. Liu. Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. – In: IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2019. pp. 1-29.Search in Google Scholar

25. Soleimany, H. Self-Similarity Cryptanalysis of the Block Cipher ITUbee. – IET Information Security, Vol. 9, 2015, No 3, pp. 179-184.Search in Google Scholar

26. Fu, S., G. Xu, J. Pan, Z. Wang, A. Wang. Differential Fault Attack on ITUbee Block Cipher. – ACM Transactions on Embedded Computing Systems, Vol. 16, 2017, No 2, pp. 1-10.Search in Google Scholar

27. Kang, Y., Q. Yu, L. Qin, G. Zhang. Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher. – Symmetry, Vol. 15, 2023, No 6, p. 1196.Search in Google Scholar

28. Meier, W. On the Security of the IDEA Block Cipher. Advances in Cryptology. – In: EUROCRYPT 1993. Berlin, Heidelberg, Springer, 2007, pp. 371-385.Search in Google Scholar

29. Biham, E., O. Dunkelman, N. Keller. A New Attack on 6-Round IDEA. Fast Software Encryption. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2007, pp. 211-224.Search in Google Scholar

30. Biham, E., O. Dunkelman, N. Keller. New Cryptanalytic Results on IDEA. Advances in Cryptology – ASIACRYPT 2006. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2006, pp. 412-427.Search in Google Scholar

31. Clavier, C., B. Gierlichs, I. Verbauwhede. Fault Analysis Study of IDEA. Topics in Cryptology – CT-RSA 2008. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2008, pp. 274-287.Search in Google Scholar

32.Biryukov, A., J. Nakahara, B. J. Preneel, J. Vandewalle. New Weak-Key Classes of IDEA. Information and Communications Security. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2002, pp. 315-326.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology