logo

Lightweight Encryption Algorithm for Secure IOT

   

Added on  2023-06-04

53 Pages14901 Words228 Views
Lightweight Encryption Algorithm

Contents
1. Introduction.........................................................................................................................2
2. Research Aim:.....................................................................................................................3
3. Literature Review:..............................................................................................................3
Security in IOT Architecture..................................................................................................4
Major risks associated with RFID tags...................................................................................8
Types of Attack:.....................................................................................................................9
Basic Requirement of Lightweight cryptographic architecture:..........................................10
Symmetric and public Key cryptography procedures:.........................................................11
4. Findings............................................................................................................................14
Trends and technology used in the Light weight cryptographic procedures........................15
Measuring efficiency of the existing light weight cryptographic algorithms:.....................15
5. Discussion.........................................................................................................................19
6. Proposed Algorithm..........................................................................................................20
Proposed Mathematical Function:........................................................................................21
Explanation of Algorithm with Example.............................................................................23
Experimental Set up for the proposed algorithm..................................................................26
7. Results...............................................................................................................................29
8. Security Analysis..............................................................................................................33
9. Recommendation..............................................................................................................35
10. Future Scope..................................................................................................................36
11. Research Limitation:.....................................................................................................36
12. Conclusion.....................................................................................................................36
13. References.....................................................................................................................37
14. Appendix:......................................................................................................................41

Lightweight Encryption Algorithm for Secure IOT
1. Introduction
Internet of thing is the emerging phenomenon in the digital world. It provides the
connectivity between digital tools and human interaction in the development of the real time
application. Security is the major concern with the IOT devices. The IOT environment is
composed of radio frequency Identifiers tags, sensors, actuators, routers, smart devices, and
human. The RFID tags helps in managing the communication between the human and the
physical smart devices for initializing the flow of information for making efficient real time
communication between them. The IOT environment is composed of three things which are
classified as pinpointing things, computation things, and interaction with the ubiquitous
computer digital world (Hasan and Ismail, 2017). The IOT architecture is composed of three
layers which are physical layer, commutation layer, and application layer. The connectivity
between the physical devices with the human is possible with the help of physical layer. The
4G network is required for managing the interaction with the physical devices. The public
network is developed for increasing the efficiency of the IOT application. The IOT devices
are equipped with some limitations such as these devices are incorporated with resource
constraints, having small memory sizes, limited bandwidth, time dependent, use of radio
frequency Identifiers, and others. These limitation makes difficulty in managing effective
security cryptographic procedures for the IOT devices to make it secure from unauthorised
modification, un-authentication accessing of account, data leakages and misuses, monitoring
of data flow, and others (Katagi, and Moriai, 2011). The vulnerabilities can be added by the
hackers in the IOT environment which can results into malfunctioning of the system. The
best solution to resolve the complexities of IOT devices in secure connection is the
development of the lightweight encryption algorithm (LEA). It is difficult for managing the
security to the complete IOT system because it will require greater capacity of memory, and
uninterrupted of the power supply which is not possible with the IOT environment. The
lightweight encryption algorithm provides security to the specific IOT devices to make it
secure from the external environment attacks (Bhardwaj, Kumar, and Bansal, 2017). It can be
the possibility that LEA developed for one device is not applicable to the other devices. The
lightweight cryptography is based on private keys developed for encrypting and decrypting
the text for security. The information in the RFID tags should present in the encrypted form
so that the efficiency and effectiveness of the data can be retrieved. The control system

architecture should be developed for preserving the flow of information from the third party.
The encryption procedures are used for increasing the error tolerance capability of public and
private keys for secure transmission of data.
2. Research Aim:
The aim of this research is to propose a new light weight encryption algorithm to provide
security to the IOT devices.
3. Literature Review:
The literature review is conducted for analysing the performance and gaps which exists in the
existing light weight encryption algorithm. The noise exerted in the path of data packets can
be effectively analysed with the development of public and private key (Usman, Ahmed,
Aslam, Khan, and Shah, 2017). The IOT architecture is equipped various cyber-attacks in the
process of data collection from the real time scenario. The sensors are used for analysing the
autonomous control over the working units of the physical devices. The encryption process
should be applied on sensor devices for managing the confidentiality and accuracy of the data
(Singh, Sharma, Moon, Park, 2017). The countermeasures and encryption process should be
used for preserving the confidentiality and sensitivity of the information to overcome the
threats and vulnerabilities (Naru, Saini, and Sharma, 2017). The following figure shows the
process of managing the countermeasure by using encryption process to manage the attack on
data collection methodology:
The data leakages can be effectively prevented by using the sensor technology and message
authentication protocols for managing the flow of information securely. The cryptographic
procedures are applied on the data link layer for securing the communication over the
physical layer connectivity between the devices (Venugopal, and Doraipandian, 2014). The

application layer provides the end-to-end connectivity for ensuring the secured usage of
resources in the communication platform. The following figure shows the implementation of
light weight cryptography algorithm in the application layer for managing the secured
connection between the server and the smart IOT devices.
The implementation of the light weight cryptography procedures helps in increasing the
efficiency of the secured communication and connection between the server and the smart
devices. The factors which are taken under consideration for the development of the light
weight cryptography algorithm are size of the memory units RAM and ROM, power
required, consumption of power units by different devices, and throughput of the processor
with respect to its speed (Nandhini, and Vanitha, 2017). The data transmission can be done
with the RFID tags for increasing the throughput and control processing in the real time
analytics. The implementation of the light weight encryption algorithm helps in increasing
the efficiency of managing end-to-end communication for preserving the security of the smart
devices. The evaluation of cryptographic algorithm takes place for increasing the level of
security in the development of the IOT environment. The literary sources help in identifying
the efficiency and limitation of the existing protocols such as AES, IDEA, TEA, HIGHT,
BLOWFISH, RC5, and PRESENT (Zhang, Seo, Wang, 2018). The Advanced encryption
standard algorithm is developed for establishing security by making use combination and
permutation network principle. The cipher blocks are developed of varying sizes such as 32
bits, 128 bits, and 256 bits. The round keys are added by using the bitwise XOR operation. It
is applicable for managing the security against the known attacks and side channel attack. It
requires low RAM and high speed data network.
Security in IOT Architecture
The IOT devices requires security for preserving the information stored in the big database
confidentiality, authorization, integrity, reliability, accuracy, control, authentication. The

exchange of data between the remote devices should be securely done for managing the
quality of operation performed by the IOT devices (Bansod, Pisharoty, and Patil, 2017). The
IOT architecture requires security at all levels of layer.
Physical Layer: The physical layer works on managing the integration of RFID tags,
actuators, sensors, data transmission, and others. The security of the physical layer is done
through the implementation of IEEE 802.15.4. It is used for securing the vulnerabilities
associated in the flow of data transmission at physical layer (Batra, 2017).
Network Layer: The transmission of data packets from data link layer to network layer can be
done securely by IPv6 and IPv4 protocol. The network layer in the IOT architecture is
deployed with inbuilt security protocol named as AES and DES.
Transport Layer: The user datagram protocol UDP is the used for managing peer to peer
communication between IOT devices.
Application layer: Constrained Application protocol is used for securing the different
application for the communication between IOT devices.
The table below shows the clear view of security protocol used in the IOT environment
The table below shows the difference between different cryptographic algorithm used in the
development of IOT architecture:

AES Protocol: The advanced encryption standard protocol is used in the collaboration with
COAP in securing the application layer. The symmetric block cipher is developed for
managing the permutation network in the development of 128 bits block cipher. The
advanced encryption standard protocol is used for analysing the vulnerabilities associated
with the processes and procedures used for developing the IOT infrastructure. The brute force
attacks can be resolved by deploying the data encryption and decryption standard. The
deployment of the AES algorithm is complied with the features like security, cost, and
implementation process. It is effective in providing security to the cipher text by minimizing
the cost incurred in managing the efficiency of the memory units. The flexibility can be
retrieved by implementing the hardware and software efficiency. The AES works on
managing the cipher block for secret key and private key of the plain text. The symmetric
approach helps in increasing the efficiency and performance of the cipher text to be not
decrypted by the hackers and the other third party. The symmetric keys length are recognised
with the help of 10 rounds. The XOR operation are applied for determining the key length.
The shifting operations are performed on increasing the strength of the symmetry key.
High security and lightweight protocol: This algorithm is used for performing the basic
operation with the help of XOR operation. The 128 bit keys are used for developing the
encryption and decryption key. The speed of the RFID system can be improved by using less
power and less programming code. The saturation attacks can be effectively resolved by the
implementation of Hight protocol. This protocol is effective in managing security to the
RFID tags. The use of this technology helps in managing the communication between the
IOT devices by managing low cost resources. The efficiency of the processor can be
improved by deploying the connection between the sensor network nodes. The scheduling of
keys can be effectively done with the help of security analysis retrieved by the parameters of
the Hight algorithm.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Lightweight Encryption Algorithm for Secure Communication in IoT
|1
|1217
|307

Network and Security
|15
|3266
|22

Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication
|11
|10056
|476

Latest advances in encryption technologies
|3
|568
|391

Internet of Things (IoT) Security
|10
|873
|56

Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication.
|5
|1758
|429