Skip to main content

An Efficient Lightweight Cryptographic Algorithm for IoT Security

  • Conference paper
  • First Online:
Information and Communication Technology and Applications (ICTA 2020)

Abstract

To perform various tasks, different devices are interconnected and interact in several emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it possible in the network for many constrained and low-resource devices to communicate, compute processes, and making a decision within themselves. But IoT has many challenges and problems, such as system power consumption, limited battery capacity, memory space, performance cost, resource constraints due to their small size and protection of the communication network. The traditional algorithms have been slow for data protection point of view, and cannot be used for data encryption on an IoT platform given the resource constraints. Therefore, this paper proposes lightweight cryptography based on the Tiny Encryption Algorithm (TEA) for an IoT driven setup to enhance speed benefit from software perspective rather than hardware implementation. The proposed algorithm was used to reduce the time for encryption in the IoT platform and to preserve the trade-off between security and efficiency. In terms of memory use, execution time, and precision, the proposed work is compared with recent works on lightweight start-ups. Results show that in an IoT driven setup, the algorithm is more secure and efficient, and more suitable for data securing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rajesh, S., Paul, V., Menon, V.G., Khosravi, M.R.: A secure and efficient lightweight symmetric encryption scheme for the transfer of text files between embedded IoT devices. Symmetry 11(2), 293 (2019)

    Article  Google Scholar 

  2. Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Human. Comput. 1–18 (2017). https://doi.org/10.1007/s12652-017-0494-4

  3. Alassaf, N., Gutub, A., Parah, S.A., Al Ghamdi, M.: Enhancing the speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools Appl. 78(23), 32633–32657 (2019)

    Article  Google Scholar 

  4. Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for the internet of things realization. IEEE Commun. Surv. Tutorials 20(4), 2961–2991 (2018)

    Article  Google Scholar 

  5. Ploennigs, J., Cohn, J., Stanford-Clark, A.: The future of IoT. IEEE Internet Things Mag. 1(1), 28–33 (2018)

    Article  Google Scholar 

  6. Philip, V., Suman, V.K., Menon, V.G., Dhanya, K.A.: A review on the latest internet of things based on healthcare applications. Int. J. Comput. Sci. Inf. Secur. 15(1), 248 (2017)

    Google Scholar 

  7. Deshkar, S., Thanseeh, R.A., Menon, V.G.: A review of IoT based m-Health systems for diabetes. Int. J. Comput. Sci. Telecommun. 8(1), 13–18 (2017)

    Google Scholar 

  8. Fink, G.A., Zarzhitsky, D.V., Carroll, T.E., Farquhar, E.D.: Security and privacy grand challenges for the Internet of Things. In: 2015 International Conference on Collaboration Technologies and Systems (CTS), pp. 27–34. IEEE, June 2015.

    Google Scholar 

  9. Mahdavinejad, M.S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., Sheth, A.P.: Machine learning for Internet of Things data analysis: a survey. Digital Commun. Netw. 4(3), 161–175 (2018)

    Article  Google Scholar 

  10. Bordel, B., Alcarria, R., De Andrés, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)

    Article  Google Scholar 

  11. Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)

    Article  Google Scholar 

  12. Dhillon, P.K., Kalra, S.: A lightweight biometrics-based remote user authentication scheme for IoT services. J. Inf. Secur. Appl. 34, 255–270 (2017)

    Google Scholar 

  13. Ostad-Sharif, A., Arshad, H., Nikooghadam, M., Abbasinezhad-Mood, D.: Three party secure data transmission in IoT networks through the design of a lightweight authenticated key agreement scheme. Future Generation Comput. Syst. 100, 882–892 (2019)

    Article  Google Scholar 

  14. Rostampour, S., Safkhani, M., Bendavid, Y., Bagheri, N.: ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob. Comput. 67, 101194 (2020)

    Article  Google Scholar 

  15. Wang, B., Zhan, Y., Zhang, Z.: Cryptanalysis of the asymmetric fully homomorphic encryption scheme. IEEE Trans. Inf. Forensics Secur. 13(6), 1460–1467 (2018)

    Article  Google Scholar 

  16. Jambhekar, N.D., Misra, S., Dhawale, C.A.: Cloud computing security with collaborating encryption. Indian J. Sci. Technol 9(21), 1–7 (2016)

    Article  Google Scholar 

  17. Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: A comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1–7. IEEE, August 2017

    Google Scholar 

  18. Ahmad, S., Alam, K.M.R., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: 2015 International Conference on Networking Systems and Security (NSysS), pp. 1–5. IEEE, January 2015.

    Google Scholar 

  19. Arogundade, O.T., Abayomi-Alli, A., Misra, S.: An ontology-based security risk management model for information systems. Arabian J. Sci. Eng. 45(8), 6183–6198 (2020). https://doi.org/10.1007/s13369-020-04524-4

    Article  Google Scholar 

  20. Osho, O., Musa, F.A., Misra, S., Uduimoh, A.A., Adewunmi, A., Ahuja, R.: AbsoluteSecure: a tri-layered data security system. In: Damaševičius, R., Vasiljevienė, G. (eds.) ICIST 2019. CCIS, vol. 1078, pp. 243–255. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30275-7_19

    Chapter  Google Scholar 

  21. Tripathy, B.K., Anuradha, J. (Eds.) Internet of Things (IoT): Technologies, Applications, Challenges, and Solutions. CRC Press, Boca Raton (2017).

    Google Scholar 

  22. Gürses, S., Berendt, B., Santen, T.: Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In: Proceedings of the UKDU Workshop, pp. 51–64 (2006).

    Google Scholar 

  23. Campbell, J.: The origins and development of the right to privacy. Edward Elgar Publishing, In Comparative Privacy and Defamation (2020)

    Book  Google Scholar 

  24. Weber, R.H.: Internet of Things-New security and privacy challenges. Computer law security review 26(1), 23–30 (2010)

    Article  Google Scholar 

  25. Ben-Daya, M., Hassini, E., Bahroun, Z.: Internet of things and supply chain management: a literature review. Int. J. Prod. Res. 57(15–16), 4719–4742 (2019)

    Article  Google Scholar 

  26. Grubbauer, M.: Assisted self-help housing in mexico: advocacy, (micro) finance, and the making of markets. Int. J. Urban Reg. Res. 44(6), 947–966 (2020)

    Article  Google Scholar 

  27. Fabian, B., Gunther, O.: Distributed ONS and its privacy impact. In: 2007 IEEE International Conference on Communications, pp. 1223–1228. IEEE, June 2007

    Google Scholar 

  28. Čolaković, A., Hadžialić, M.: Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018)

    Article  Google Scholar 

  29. Malik, M., Dutta, M., Granjal, J.: A survey of key bootstrapping protocols based on public-key cryptography in the Internet of Things. IEEE Access 7, 27443–27464 (2019)

    Article  Google Scholar 

  30. Jiang, W., Li, H., Xu, G., Wen, M., Dong, G., Lin, X.: PTAS: privacy-preserving thin-client authentication scheme in blockchain-based PKI. Future Generation Comput. Syst. 96, 185–195 (2019)

    Article  Google Scholar 

  31. Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning-based solutions for the security of the Internet of Things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)

    Article  Google Scholar 

  32. De Rango, F., Potrino, G., Tropea, M., Fazio, P.: Energy-aware dynamic Internet of a Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks. Pervasive Mob. Comput. 61, 101105 (2020)

    Article  Google Scholar 

  33. Chatterjee, R., Chakraborty, R.: A modified lightweight PRESENT cipher For IoT security. In: 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1–6. IEEE, March 2020

    Google Scholar 

  34. Wu, F., Wu, T., Yuce, M.R.: An internet-of-things (IoT) network system for connected efficiency and health monitoring applications. Sensors 19(1), 21 (2019)

    Article  Google Scholar 

  35. Odun-Ayo, I., Misra, S., Omoregbe, N.A., Onibere, E., Bulama, Y., Damasevicius, R.: Cloud-based security driven human resource management system. In: ICADIWT, pp. 96–106, March 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Bamidele Awotunde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdulraheem, M., Awotunde, J.B., Jimoh, R.G., Oladipo, I.D. (2021). An Efficient Lightweight Cryptographic Algorithm for IoT Security. In: Misra, S., Muhammad-Bello, B. (eds) Information and Communication Technology and Applications. ICTA 2020. Communications in Computer and Information Science, vol 1350. Springer, Cham. https://doi.org/10.1007/978-3-030-69143-1_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69143-1_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69142-4

  • Online ISBN: 978-3-030-69143-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics