Abstract
Internet of things is a fast-growing field of industry as a lot of IoT applications are introduced in the market. Its popularity is also growing because of its ease of use and its applications serving in vast domains. The demand for IoT deployment over a large scale is increasing at a swift pace. A lot of issues and challenges have worked on, and a lot remains to be explored and solved. It has become a focus of research. A considerable number of researches have contributed a lot in the field of IoT. However, still it is lagging in the security domain, so is the reason for concern for many researchers. There are few other concerns in IoT which are related to the security goals, requirements, challenges, and issues. This paper provides an overview of IoT along with presenting various privacy and security issues in it. The paper also shows how the security in IoT differs from the security in conventional systems. Various lightweight encryption techniques for IoT, limitations of IoT, IoT technologies, and architectures are discussed and compared in the paper.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Whitmore A, Agarwal A, Da Xu L (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17(2):261–274
Horrow S, Sardana A (2012) Identity management framework for cloud based internet of things. In: Proceedings of the first international conference on security of internet of things. ACM, pp 200–203
Mansfield-Devine S (2016) Securing the internet of things. Comput Fraud Secur 2016(4):15–20
Lu C (2014) Overview of security and privacy issues in the internet of things. Washington University
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering, vol 3. IEEE, pp 648–651
Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, pp 663–667
Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE, pp 32–37
Trappe W, Howard R, Moore RS (2015) Low-energy security: Limits and opportunities in the internet of things. IEEE Secur Priv 13(1):14–21
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J 4(5):1250–1258
Shafagh H, Hithnawi A, Dröscher A, Duquennoy S, Hu W (2015) Poster: towards encrypted query processing for the internet of things. In: Proceedings of the 21st annual international conference on mobile computing and networking. ACM, pp 251–253
Kotamsetty R, Govindarasu M (2016) Adaptive latency-aware query processing on encrypted data for the internet of things. In: 2016 25th international conference on computer communication and networks (ICCCN). IEEE, pp 1–7
Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media
Wheeler DJ, Needham RM (1994) TEA, a tiny encryption algorithm. In: International workshop on fast software encryption. Springer, pp 363–366
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 1–18
Rivest RL (1994) The RC5 encryption algorithm. In: International workshop on fast software encryption. Springer, pp 86–96
Sarkar S (2014) Small secret exponent attack on RSA variant with modulus. Des Codes Crypt 73(2):383–392
Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1998) Twofish: A 128-bit block cipher. NIST AES Propos 15(1):23–91
Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112
Yang Y, Zheng X, Tang C (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37
Baskar C, Balasubramaniyan C, Manivannan D (2016) Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Comput Sci 78:165–171
Al Salami S, Baek J, Salah K, Damiani E (2016) Lightweight encryption for smart home. In: 2016 11th international conference on availability, reliability and security (ARES). IEEE, pp 382–388
Liang C, Ye N, Malekian R, Wang R (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: 2016 2nd international symposium on agent, multi-agent systems and robotics (ISAMSR). IEEE, pp 160–166
Fugkeaw S, Sato H (2016) Improved lightweight proxy re-encryption for flexible and scalable mobile revocation management in cloud computing. In: 2016 IEEE 9th international conference on cloud computing (CLOUD). IEEE, pp 894–899
Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Futur Gener Comput Syst 72:239–249
Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95–108
Baharon MR, Shi Q, Llewellyn-Jones D (2015) A new lightweight homomorphic encryption scheme for mobile cloud computing. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 618–625
Zegers W, Chang SY, Park Y, Gao J (2015) A lightweight encryption and secure protocol for smartphone cloud. In: 2015 IEEE symposium on service-oriented system engineering. IEEE, pp 259–26
Sahraoui S, Bilami A (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Comput Netw 91:26–45
Aazam M, St-Hilaire M, Lung CH, Lambadaris I (2016) PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 12–17
Jiang H, Shen F, Chen S, Li KC, Jeong YS (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141
Bose T, Bandyopadhyay S, Ukil A, Bhattacharyya A, Pal A (2015) Why not keep your personal data secure yet private in IoT? Our lightweight approach. In: 2015 IEEE tenth international conference on intelligent sensors, sensor networks and information processing (ISSNIP). IEEE, pp 1–6
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Chakrabarty S, Engels DW (2016) A secure IoT architecture for smart cities. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 812–813
Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J et al (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094
Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16
Medagliani P, Leguay J, Duda A, Rousseau F, Duquennoy S, Raza S et al (2014) Internet of things applications-from research and innovation to market deployment. The River Publishers
Valdivieso Caraguay AL, Benito Peral A, Barona Lopez LI, Garcia Villalba LJ (2014) SDN: Evolution and opportunities in the development IoT applications. Int J Distrib Sens Netw 10(5):735142
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Rishabh, Sharma, T.P. (2020). Lightweight Encryption Algorithms, Technologies, and Architectures in Internet of Things: A Survey. In: Saini, H., Sayal, R., Buyya, R., Aliseri, G. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 103. Springer, Singapore. https://doi.org/10.1007/978-981-15-2043-3_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-2043-3_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2042-6
Online ISBN: 978-981-15-2043-3
eBook Packages: EngineeringEngineering (R0)