Abstract
To perform various tasks, different devices are interconnected and interact in several emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it possible in the network for many constrained and low-resource devices to communicate, compute processes, and making a decision within themselves. But IoT has many challenges and problems, such as system power consumption, limited battery capacity, memory space, performance cost, resource constraints due to their small size and protection of the communication network. The traditional algorithms have been slow for data protection point of view, and cannot be used for data encryption on an IoT platform given the resource constraints. Therefore, this paper proposes lightweight cryptography based on the Tiny Encryption Algorithm (TEA) for an IoT driven setup to enhance speed benefit from software perspective rather than hardware implementation. The proposed algorithm was used to reduce the time for encryption in the IoT platform and to preserve the trade-off between security and efficiency. In terms of memory use, execution time, and precision, the proposed work is compared with recent works on lightweight start-ups. Results show that in an IoT driven setup, the algorithm is more secure and efficient, and more suitable for data securing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rajesh, S., Paul, V., Menon, V.G., Khosravi, M.R.: A secure and efficient lightweight symmetric encryption scheme for the transfer of text files between embedded IoT devices. Symmetry 11(2), 293 (2019)
Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Human. Comput. 1–18 (2017). https://doi.org/10.1007/s12652-017-0494-4
Alassaf, N., Gutub, A., Parah, S.A., Al Ghamdi, M.: Enhancing the speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools Appl. 78(23), 32633–32657 (2019)
Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for the internet of things realization. IEEE Commun. Surv. Tutorials 20(4), 2961–2991 (2018)
Ploennigs, J., Cohn, J., Stanford-Clark, A.: The future of IoT. IEEE Internet Things Mag. 1(1), 28–33 (2018)
Philip, V., Suman, V.K., Menon, V.G., Dhanya, K.A.: A review on the latest internet of things based on healthcare applications. Int. J. Comput. Sci. Inf. Secur. 15(1), 248 (2017)
Deshkar, S., Thanseeh, R.A., Menon, V.G.: A review of IoT based m-Health systems for diabetes. Int. J. Comput. Sci. Telecommun. 8(1), 13–18 (2017)
Fink, G.A., Zarzhitsky, D.V., Carroll, T.E., Farquhar, E.D.: Security and privacy grand challenges for the Internet of Things. In: 2015 International Conference on Collaboration Technologies and Systems (CTS), pp. 27–34. IEEE, June 2015.
Mahdavinejad, M.S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., Sheth, A.P.: Machine learning for Internet of Things data analysis: a survey. Digital Commun. Netw. 4(3), 161–175 (2018)
Bordel, B., Alcarria, R., De Andrés, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)
Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)
Dhillon, P.K., Kalra, S.: A lightweight biometrics-based remote user authentication scheme for IoT services. J. Inf. Secur. Appl. 34, 255–270 (2017)
Ostad-Sharif, A., Arshad, H., Nikooghadam, M., Abbasinezhad-Mood, D.: Three party secure data transmission in IoT networks through the design of a lightweight authenticated key agreement scheme. Future Generation Comput. Syst. 100, 882–892 (2019)
Rostampour, S., Safkhani, M., Bendavid, Y., Bagheri, N.: ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob. Comput. 67, 101194 (2020)
Wang, B., Zhan, Y., Zhang, Z.: Cryptanalysis of the asymmetric fully homomorphic encryption scheme. IEEE Trans. Inf. Forensics Secur. 13(6), 1460–1467 (2018)
Jambhekar, N.D., Misra, S., Dhawale, C.A.: Cloud computing security with collaborating encryption. Indian J. Sci. Technol 9(21), 1–7 (2016)
Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: A comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1–7. IEEE, August 2017
Ahmad, S., Alam, K.M.R., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: 2015 International Conference on Networking Systems and Security (NSysS), pp. 1–5. IEEE, January 2015.
Arogundade, O.T., Abayomi-Alli, A., Misra, S.: An ontology-based security risk management model for information systems. Arabian J. Sci. Eng. 45(8), 6183–6198 (2020). https://doi.org/10.1007/s13369-020-04524-4
Osho, O., Musa, F.A., Misra, S., Uduimoh, A.A., Adewunmi, A., Ahuja, R.: AbsoluteSecure: a tri-layered data security system. In: Damaševičius, R., Vasiljevienė, G. (eds.) ICIST 2019. CCIS, vol. 1078, pp. 243–255. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30275-7_19
Tripathy, B.K., Anuradha, J. (Eds.) Internet of Things (IoT): Technologies, Applications, Challenges, and Solutions. CRC Press, Boca Raton (2017).
Gürses, S., Berendt, B., Santen, T.: Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In: Proceedings of the UKDU Workshop, pp. 51–64 (2006).
Campbell, J.: The origins and development of the right to privacy. Edward Elgar Publishing, In Comparative Privacy and Defamation (2020)
Weber, R.H.: Internet of Things-New security and privacy challenges. Computer law security review 26(1), 23–30 (2010)
Ben-Daya, M., Hassini, E., Bahroun, Z.: Internet of things and supply chain management: a literature review. Int. J. Prod. Res. 57(15–16), 4719–4742 (2019)
Grubbauer, M.: Assisted self-help housing in mexico: advocacy, (micro) finance, and the making of markets. Int. J. Urban Reg. Res. 44(6), 947–966 (2020)
Fabian, B., Gunther, O.: Distributed ONS and its privacy impact. In: 2007 IEEE International Conference on Communications, pp. 1223–1228. IEEE, June 2007
Čolaković, A., Hadžialić, M.: Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018)
Malik, M., Dutta, M., Granjal, J.: A survey of key bootstrapping protocols based on public-key cryptography in the Internet of Things. IEEE Access 7, 27443–27464 (2019)
Jiang, W., Li, H., Xu, G., Wen, M., Dong, G., Lin, X.: PTAS: privacy-preserving thin-client authentication scheme in blockchain-based PKI. Future Generation Comput. Syst. 96, 185–195 (2019)
Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning-based solutions for the security of the Internet of Things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)
De Rango, F., Potrino, G., Tropea, M., Fazio, P.: Energy-aware dynamic Internet of a Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks. Pervasive Mob. Comput. 61, 101105 (2020)
Chatterjee, R., Chakraborty, R.: A modified lightweight PRESENT cipher For IoT security. In: 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1–6. IEEE, March 2020
Wu, F., Wu, T., Yuce, M.R.: An internet-of-things (IoT) network system for connected efficiency and health monitoring applications. Sensors 19(1), 21 (2019)
Odun-Ayo, I., Misra, S., Omoregbe, N.A., Onibere, E., Bulama, Y., Damasevicius, R.: Cloud-based security driven human resource management system. In: ICADIWT, pp. 96–106, March 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D. (2021). An Efficient Lightweight Cryptographic Algorithm for IoT Security. In: Misra, S., Muhammad-Bello, B. (eds) Information and Communication Technology and Applications. ICTA 2020. Communications in Computer and Information Science, vol 1350. Springer, Cham. https://doi.org/10.1007/978-3-030-69143-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-69143-1_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69142-4
Online ISBN: 978-3-030-69143-1
eBook Packages: Computer ScienceComputer Science (R0)