A Review on Key Management and Lightweight Cryptography for IoT

Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan
{"title":"A Review on Key Management and Lightweight Cryptography for IoT","authors":"Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan","doi":"10.1109/GCWOT49901.2020.9391613","DOIUrl":null,"url":null,"abstract":"Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCWOT49901.2020.9391613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.
物联网密钥管理和轻量级加密技术综述
物联网(IoT)是一种允许完全不同的设备通过互联网连接以进行数据交换的技术。这些设备的例子可以是孩子使用的玩具,汽车里的音响系统或厨房用具。甚至在上个世纪末,它还不是一个明确的概念,但在过去的二十年里,它已经成为我们生活中不可或缺的一部分。其核心原因是消费者的超节奏适应能力。在不同的物联网设备之间共享大量数据的不幸方面是,黑客和不道德的用户对这些数据感兴趣,这些设备成为这些人利用漏洞获取数据的目标。此外,如果这些数据落入黑客或不道德的用户手中,它可以很容易地危及作为该数据所有者的整个组织。在本文中,我们初步研究了IoT(物联网)的安全需求,这些安全需求根据TCP/IP模型的层进行了分类。在对安全需求进行深入分析和批判性评估之后,我们将着眼于系统和物联网的关键管理视角。最后,我们讨论轻量级加密,这是特别用于物联网。我们通过轻量级加密技术对物联网中使用的所有可能算法进行了深入分析。在我们的研究工作中,还对各种轻量级算法的优缺点进行了全面的比较。物联网配置中的主要安全问题也是身份验证和机密性。因此,我们得出结论,对于客户端到客户端通信应该使用密钥加密,在物联网配置中客户端需要与服务器通信的地方,可以使用基于轻量级算法的椭圆曲线加密进行身份验证,并遵循密钥机制进行保密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信