TY - JOUR
T1 - A review on lightweight cryptography for Internet-of-Things based applications
AU - Rao, Vidya
AU - Prema, K. V.
N1 - Publisher Copyright:
© 2020, Springer-Verlag GmbH Germany, part of Springer Nature.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2021/9/1
Y1 - 2021/9/1
N2 - The Internet-of-Things (IoT) is a combination of an intelligent infrastructure combined with various self-organizing devices. These devices are used to monitor the environment and help to exchange sensitive data over the Internet without much human interference. Such a huge network of unmanned devices are subjected to various security and privacy concern. As these devices are battery powered and have low inbuilt resources, it is important to enable secure and resource-constrained security solutions to secure the devices. Thereby, to address the security and privacy of these devices and the data, the authentication plays an important role along with data integrity. Through this paper, we have analyzed the various lightweight solution and their security threats under the authentication and data integrity of the IoT applications. From the study, it can be seen that the major security concern of these protocols is to perform with less computation and resist to attacks like man-in-the-middle, replay attacks, denial of service attacks, forgery and chosen-ciphertext attacks. Also, this review provides an insight into using the Microsoft threat modeling tool used for IoT based applications.
AB - The Internet-of-Things (IoT) is a combination of an intelligent infrastructure combined with various self-organizing devices. These devices are used to monitor the environment and help to exchange sensitive data over the Internet without much human interference. Such a huge network of unmanned devices are subjected to various security and privacy concern. As these devices are battery powered and have low inbuilt resources, it is important to enable secure and resource-constrained security solutions to secure the devices. Thereby, to address the security and privacy of these devices and the data, the authentication plays an important role along with data integrity. Through this paper, we have analyzed the various lightweight solution and their security threats under the authentication and data integrity of the IoT applications. From the study, it can be seen that the major security concern of these protocols is to perform with less computation and resist to attacks like man-in-the-middle, replay attacks, denial of service attacks, forgery and chosen-ciphertext attacks. Also, this review provides an insight into using the Microsoft threat modeling tool used for IoT based applications.
UR - http://www.scopus.com/inward/record.url?scp=85096367293&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85096367293&partnerID=8YFLogxK
U2 - 10.1007/s12652-020-02672-x
DO - 10.1007/s12652-020-02672-x
M3 - Article
AN - SCOPUS:85096367293
SN - 1868-5137
JO - Journal of Ambient Intelligence and Humanized Computing
JF - Journal of Ambient Intelligence and Humanized Computing
ER -