Lightweight Encryption Algorithms, Technologies, and Architectures in Internet of Things: A Survey

  • Rishabh
  • T. P. Sharma
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)


Internet of things is a fast-growing field of industry as a lot of IoT applications are introduced in the market. Its popularity is also growing because of its ease of use and its applications serving in vast domains. The demand for IoT deployment over a large scale is increasing at a swift pace. A lot of issues and challenges have worked on, and a lot remains to be explored and solved. It has become a focus of research. A considerable number of researches have contributed a lot in the field of IoT. However, still it is lagging in the security domain, so is the reason for concern for many researchers. There are few other concerns in IoT which are related to the security goals, requirements, challenges, and issues. This paper provides an overview of IoT along with presenting various privacy and security issues in it. The paper also shows how the security in IoT differs from the security in conventional systems. Various lightweight encryption techniques for IoT, limitations of IoT, IoT technologies, and architectures are discussed and compared in the paper.


Lightweight encryption algorithms Internet of things Technologies and architectures Privacy Security 


  1. 1.
    Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRefGoogle Scholar
  2. 2.
    Whitmore A, Agarwal A, Da Xu L (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRefGoogle Scholar
  3. 3.
    Horrow S, Sardana A (2012) Identity management framework for cloud based internet of things. In: Proceedings of the first international conference on security of internet of things. ACM, pp 200–203Google Scholar
  4. 4.
    Mansfield-Devine S (2016) Securing the internet of things. Comput Fraud Secur 2016(4):15–20CrossRefGoogle Scholar
  5. 5.
    Lu C (2014) Overview of security and privacy issues in the internet of things. Washington UniversityGoogle Scholar
  6. 6.
    Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering, vol 3. IEEE, pp 648–651Google Scholar
  7. 7.
    Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, pp 663–667Google Scholar
  8. 8.
    Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE, pp 32–37 Google Scholar
  9. 9.
    Trappe W, Howard R, Moore RS (2015) Low-energy security: Limits and opportunities in the internet of things. IEEE Secur Priv 13(1):14–21CrossRefGoogle Scholar
  10. 10.
    Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J 4(5):1250–1258CrossRefGoogle Scholar
  11. 11.
    Shafagh H, Hithnawi A, Dröscher A, Duquennoy S, Hu W (2015) Poster: towards encrypted query processing for the internet of things. In: Proceedings of the 21st annual international conference on mobile computing and networking. ACM, pp 251–253Google Scholar
  12. 12.
    Kotamsetty R, Govindarasu M (2016) Adaptive latency-aware query processing on encrypted data for the internet of things. In: 2016 25th international conference on computer communication and networks (ICCCN). IEEE, pp 1–7Google Scholar
  13. 13.
    Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business MediaGoogle Scholar
  14. 14.
    Wheeler DJ, Needham RM (1994) TEA, a tiny encryption algorithm. In: International workshop on fast software encryption. Springer, pp 363–366Google Scholar
  15. 15.
    Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 1–18Google Scholar
  16. 16.
    Rivest RL (1994) The RC5 encryption algorithm. In: International workshop on fast software encryption. Springer, pp 86–96Google Scholar
  17. 17.
    Sarkar S (2014) Small secret exponent attack on RSA variant with modulus. Des Codes Crypt 73(2):383–392MathSciNetCrossRefGoogle Scholar
  18. 18.
    Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1998) Twofish: A 128-bit block cipher. NIST AES Propos 15(1):23–91Google Scholar
  19. 19.
    Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112CrossRefGoogle Scholar
  20. 20.
    Yang Y, Zheng X, Tang C (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37CrossRefGoogle Scholar
  21. 21.
    Baskar C, Balasubramaniyan C, Manivannan D (2016) Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Comput Sci 78:165–171CrossRefGoogle Scholar
  22. 22.
    Al Salami S, Baek J, Salah K, Damiani E (2016) Lightweight encryption for smart home. In: 2016 11th international conference on availability, reliability and security (ARES). IEEE, pp 382–388Google Scholar
  23. 23.
    Liang C, Ye N, Malekian R, Wang R (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: 2016 2nd international symposium on agent, multi-agent systems and robotics (ISAMSR). IEEE, pp 160–166Google Scholar
  24. 24.
    Fugkeaw S, Sato H (2016) Improved lightweight proxy re-encryption for flexible and scalable mobile revocation management in cloud computing. In: 2016 IEEE 9th international conference on cloud computing (CLOUD). IEEE, pp 894–899Google Scholar
  25. 25.
    Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Futur Gener Comput Syst 72:239–249CrossRefGoogle Scholar
  26. 26.
    Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95–108CrossRefGoogle Scholar
  27. 27.
    Baharon MR, Shi Q, Llewellyn-Jones D (2015) A new lightweight homomorphic encryption scheme for mobile cloud computing. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 618–625Google Scholar
  28. 28.
    Zegers W, Chang SY, Park Y, Gao J (2015) A lightweight encryption and secure protocol for smartphone cloud. In: 2015 IEEE symposium on service-oriented system engineering. IEEE, pp 259–26Google Scholar
  29. 29.
    Sahraoui S, Bilami A (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Comput Netw 91:26–45CrossRefGoogle Scholar
  30. 30.
    Aazam M, St-Hilaire M, Lung CH, Lambadaris I (2016) PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 12–17Google Scholar
  31. 31.
    Jiang H, Shen F, Chen S, Li KC, Jeong YS (2015) A secure and scalable storage system for aggregate data in IoT. Futur Gener Comput Syst 49:133–141CrossRefGoogle Scholar
  32. 32.
    Bose T, Bandyopadhyay S, Ukil A, Bhattacharyya A, Pal A (2015) Why not keep your personal data secure yet private in IoT? Our lightweight approach. In: 2015 IEEE tenth international conference on intelligent sensors, sensor networks and information processing (ISSNIP). IEEE, pp 1–6Google Scholar
  33. 33.
    Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRefGoogle Scholar
  34. 34.
    Chakrabarty S, Engels DW (2016) A secure IoT architecture for smart cities. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, pp 812–813Google Scholar
  35. 35.
    Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J et al (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459CrossRefGoogle Scholar
  36. 36.
    Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094CrossRefGoogle Scholar
  37. 37.
    Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16CrossRefGoogle Scholar
  38. 38.
    Medagliani P, Leguay J, Duda A, Rousseau F, Duquennoy S, Raza S et al (2014) Internet of things applications-from research and innovation to market deployment. The River PublishersGoogle Scholar
  39. 39.
    Valdivieso Caraguay AL, Benito Peral A, Barona Lopez LI, Garcia Villalba LJ (2014) SDN: Evolution and opportunities in the development IoT applications. Int J Distrib Sens Netw 10(5):735142CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Rishabh
    • 1
  • T. P. Sharma
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology HamirpurHamirpurIndia

Personalised recommendations