TY - JOUR
T1 - Lightweight cryptography in IoT networks
T2 - A survey
AU - Rana, Muhammad
AU - Mamun, Quazi
AU - Islam, Rafiqul
N1 - Publisher Copyright:
© 2021
PY - 2022/4
Y1 - 2022/4
N2 - With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of IoT devices, traditional cryptographic protocols are no longer suited to all IoT environments, such as the smart city. As a result, researchers have been proposing various lightweight cryptographic algorithms and protocols to secure data on IoT networks. This paper discusses state-of-the-art lightweight cryptographic protocols for IoT networks and presents a comparative analysis of popular contemporary ciphers. In doing so, it has classified the most current algorithms into two parts: symmetric and asymmetric lightweight cryptography. Additionally, we evaluate several recently developed block cipher and stream cipher algorithms in terms of their security. In the final section of this paper, we address the changes that need to be made and suggest future research topics.
AB - With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of IoT devices, traditional cryptographic protocols are no longer suited to all IoT environments, such as the smart city. As a result, researchers have been proposing various lightweight cryptographic algorithms and protocols to secure data on IoT networks. This paper discusses state-of-the-art lightweight cryptographic protocols for IoT networks and presents a comparative analysis of popular contemporary ciphers. In doing so, it has classified the most current algorithms into two parts: symmetric and asymmetric lightweight cryptography. Additionally, we evaluate several recently developed block cipher and stream cipher algorithms in terms of their security. In the final section of this paper, we address the changes that need to be made and suggest future research topics.
KW - Block cipher
KW - Elliptic curve cipher
KW - Internet of Things (IoT)
KW - Lightweight cryptography
KW - Security
KW - Stream cipher
UR - http://www.scopus.com/inward/record.url?scp=85120994746&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85120994746&partnerID=8YFLogxK
U2 - 10.1016/j.future.2021.11.011
DO - 10.1016/j.future.2021.11.011
M3 - Review article
AN - SCOPUS:85120994746
SN - 0167-739X
VL - 129
SP - 77
EP - 89
JO - Future Generation Computer Systems
JF - Future Generation Computer Systems
ER -