skip to main content
10.1145/3231053.3231100acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A review of data security and cryptographic techniques in IoT based devices

Published: 26 June 2018 Publication History

Abstract

The idea of the Internet of Things (IoT) is to connect or give access to everything to the Internet. IoT environment not only provides the facility of Human to Machine connectivity, however, it also creates Machine to Machine connectivity. As everything is going to connect to the Internet and also generating the data. So, the data generating by these devices is growing up rapidly, that huge amount of data is called Big Data. This data has huge Volume, High Velocity, and different Variety. The security of this data is a risk. As we know that, the IoT devices have constraints like low power and less computational speed and the traditional encryption algorithms like DES, 3DES, and AES are more complex. Traditional encryption algorithm seems not feasible for IoT devices. So, we need to develop Lightweight encryption algorithm for IoT devices for secure communication and secure data transmission in IoT environment. Cryptography and Steganography techniques are used for securing the data over the Internet. Cryptography encrypts the data by using a key and make a ciphertext that cannot be readable by the normal user. Steganography hides the data by concealing it into another medium like data, image, audio, video, or mixed. This paper provides a review of important lightweight cryptographic techniques used for IoT devices.

References

[1]
Oracevic, A., Dilek, S., & Özdemir, S. (2017). Security in internet of things: A survey. 2017 International Symposium on Networks, Computers and Communications (ISNCC), (June), 1--6.
[2]
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of Security and Privacy Issues of Internet of Things. arXiv Preprint arXiv:1501.02211, 7. Retrieved from http://arxiv.org/abs/1501.02211
[3]
Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review. Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, 3, 648--651.
[4]
Jabbar, S., Malik, K. R., Ahmad, M., Aldabbas, O., Asif, M., Khalid, S., Han, K. J., Ahmad, S. H., "A Methodology of Real-Time Data Fusion for Localized Big Data Analytics" in IEEE ACCESS, IEEE, 2018.
[5]
SathishKumar, J., & R. Patel, D. (2014). A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications, 90(11), 20--26.
[6]
Baby, A., Scholar, P. G., & Krishnan, H. (2017). Combined Strength of Steganography and Cryptography- A Literature Survey, 8(3), 1007--1010.
[7]
Ahmad, M., Jabbar, S., & Ahmad, A. "A Sustainable Solution to Support Data Security in High Bandwidth Health Care Remote Locations by using TCP CUBIC Mechanism" in IEEE Transaction on Sustainable Computing, IEEE, 2018.
[8]
Sathish Kumar, J., & R. Patel, D. (2014). A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications, 90(11), 20--26.
[9]
Zaragoza, M. G., Kim, H., & Lee, R. Y. Big Data and IoT for U-healthcare Security (2018). Computer and Information Science, 719, 1--11.
[10]
Tausif, M., Ferzund, J., Jabbar, S., & Shahzadi, R. (2017). Towards designing efficient lightweight ciphers for internet of things. KSII Transactions on Internet and Information Systems, 11(8), 4006--4024.
[11]
Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A Lightweight Encryption Algorithm for Secure Internet of Things, 8(1).
[12]
Kumar, M., Kumar, S., Budhiraja, R., Das, M. K., & Singh, S. (2017). Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach. Proceedings - 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, (3), 424--428.
[13]
Patil, J., Bansod, G., & Kant, K. S. "LiCi: A new ultra-lightweight block cipher," in 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), feb 2017, pp. 40--45.
[14]
Das, R., & Das, I. (2017). Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques. Proceedings - 2016 2nd IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2016, 296--301.
[15]
Echandouri, B., Hanin, C., Omary, F., & Elbernoussi, S. (n.d.). LCAHASH-MAC : A New lightweight Message Authentication code Using Cellular Automata for RFID. nov 2017, pp. 287--298.
[16]
Bapat, C., Baleri, G., B, S. I., & Nimkar, A. V. (2017). Smart-Lock Security Re-engineered Using Cryptography and Steganography, Security in Computing and Communications, 325--336.
[17]
Jang, S., Lim, D., Kang, J., & Joe, I. (2016). An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things. Wireless Personal Communications, 91(4), 1681--1695.
[18]
Aljawarneh, S., Yassein, M. B., & Talafha, W. A. (2017). A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools and Applications, 76(21), 22703--22724.
[19]
Indrayani, R., Nugroho, H. A., Hidayat, R., & Pratama, I. (2017). Increasing the security of MP3 steganography using AES Encryption and MD5 hash function. Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 129--132.
[20]
V, M. B., Manimegalai, M., & Sinduja, V. (2013). Enhancement of Image Security with New Methods of Cryptography and Steganography, 9(9), 59--64.
[21]
Patel, N., & Meena, S. (n.d.). LSB Based Image Steganography Using Dynamic Key Cryptography. 2016 International Conference on Emerging Trends in Communication Technologies (ETCT),
[22]
Sarvabhatla, M., Chandra, M. R. M., & Vorugunti, C. S. (2015). A secure and light weight authentication service in hadoop using one time pad. Procedia Computer Science, 50, 81--86.

Cited By

View all
  • (2024)To Enhance Cyber Security for IoTAdvanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection10.4018/979-8-3693-9225-6.ch011(271-308)Online publication date: 4-Oct-2024
  • (2024)Enhanced cryptography techniques using inherited process with cyclic crossover operation in big dataInternational Journal of Modeling, Simulation, and Scientific Computing10.1142/S1793962324500375Online publication date: 22-Aug-2024
  • (2024)Directional Antenna-Based Routing Protocol With Low Detection Probability in Airborne NetworksIEEE Sensors Journal10.1109/JSEN.2023.334932524:5(6919-6929)Online publication date: 1-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
June 2018
469 pages
ISBN:9781450364287
DOI:10.1145/3231053
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT
  2. big data
  3. ciphers
  4. cryptography
  5. decryption
  6. encryption
  7. lightweight
  8. security
  9. stenography

Qualifiers

  • Research-article

Conference

ICFNDS'18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)71
  • Downloads (Last 6 weeks)4
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)To Enhance Cyber Security for IoTAdvanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection10.4018/979-8-3693-9225-6.ch011(271-308)Online publication date: 4-Oct-2024
  • (2024)Enhanced cryptography techniques using inherited process with cyclic crossover operation in big dataInternational Journal of Modeling, Simulation, and Scientific Computing10.1142/S1793962324500375Online publication date: 22-Aug-2024
  • (2024)Directional Antenna-Based Routing Protocol With Low Detection Probability in Airborne NetworksIEEE Sensors Journal10.1109/JSEN.2023.334932524:5(6919-6929)Online publication date: 1-Mar-2024
  • (2024)Using Esch256 Algorithm of the Sparkle Permutation Family to Enhance the Security of ESP-NOW Communication for Smart Lock Systems2024 10th International Conference on Wireless and Telematics (ICWT)10.1109/ICWT62080.2024.10674707(1-6)Online publication date: 4-Jul-2024
  • (2024)IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey2024 25th International Arab Conference on Information Technology (ACIT)10.1109/ACIT62805.2024.10876942(1-9)Online publication date: 10-Dec-2024
  • (2024)Securing X-Ray Images in No Interest Region (NIR) of the Normalized Cover Image by Edge SteganographyIEEE Access10.1109/ACCESS.2024.346716712(168672-168689)Online publication date: 2024
  • (2024)Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum TechniquesIEEE Access10.1109/ACCESS.2024.336723212(27530-27555)Online publication date: 2024
  • (2024)Implementation of Blockchain in Healthcare Sector: A ReviewRecent Advances in Industrial and Systems Engineering10.1007/978-981-97-4700-9_20(201-211)Online publication date: 27-Aug-2024
  • (2023)Bibliometric Analysis of IoT Lightweight CryptographyInformation10.3390/info1412063514:12(635)Online publication date: 28-Nov-2023
  • (2023)Implementation of Private Blockchain Extension on Open Source IoT Platform using Hyperledger Besu2023 International Electronics Symposium (IES)10.1109/IES59143.2023.10242464(507-513)Online publication date: 8-Aug-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media