Skip to main content

Challenging Aspects of Data Preserving Algorithms in IoT Enabled Smart Societies

  • Chapter
  • First Online:
Society 5.0: Smart Future Towards Enhancing the Quality of Society

Part of the book series: Advances in Sustainability Science and Technology ((ASST))

Abstract

With the technological progress, securing information from attackers is considered a major concerning factor. Society 5.0 is a super-smart society where individuals can tackle many social issues by incorporating various industrial revolutions using smart devices. The influence of these smart devices has made the life of humankind easier and smarter. Due to the parametric changes in size and power requirements, it is tough to apply convention cryptographic procedures on these smart gadgets of Society 5.0 for information security. Generally, standard cryptographic algorithms are too energy-consuming for these embedded devices. One of the significant tools for providing security solutions to these size-limited portable devices is Lightweight Cryptography (LWC). Nowadays, researchers focus on these lightweight security algorithms to optimize maximum throughput and performance with less area and energy consumption. Hence, the current paper presents a detailed analysis of Lightweight Cryptographic cipher approaches on various platforms with their merits and demerits. Also, highlighted the features of each cipher with their performance metrics parameters. Finally, discussed the open research challenges related to the field of Lightweight Cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zahoor S, Mir RN (2018) Resource management in pervasive internet of things: a survey. J King Saud Univ Comp Inform Sci (2018)

    Google Scholar 

  2. Mohd B, Hayajneh T, Vasilakos A (2015) A survey on lightweight block ciphers for low-resource devices: comparative study and open issues. J Netw Comp Appl 58:73–93

    Google Scholar 

  3. Prakasam P, Madheswaran M, Sujith KP, Md Shohel Sayeed (2021) An enhanced energy efficient lightweight cryptography method for various IoT devices. ICT Express 7(4):487–492. ISSN 2405-9595

    Google Scholar 

  4. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput

    Google Scholar 

  5. Gupta DN, Kumar R (2019) Lightweight cryptography: an IoT perspective. Int J Innov Technol Explor Eng (IJITEE) 8(8). ISSN: 2278-3075

    Google Scholar 

  6. Chatterjee R, Chakraborty R, JK M (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1:215–224

    Google Scholar 

  7. Singh P, Chauhan R (2017) A survey on comparisons of cryptographic algorithms using certain parameters in WSN. Int J Electr Comp Eng (IJECE) 7:2232

    Google Scholar 

  8. McKay K, Feldman L, Witte G (2017) Toward standardizing lightweight cryptography, ITL bulletin, national institute of standards and technology, Gaithersburg, MD

    Google Scholar 

  9. Abed S, Jaffal R, Mohd BJ, Al-Shayeji M (2021) An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput 24:3065–3084

    Google Scholar 

  10. Acosta AJ, Tena-Sánchez E, Jiménez-Fernández CJ, Mora-Merchan JM (2017) Power and energy issues on lightweight cryptography. J Low Power Electron

    Google Scholar 

  11. Bobby S (2015) Green computing techniques to power management and energy efficiency. In: Proceedings of the UGC sponsored national conference on advanced networking and applications

    Google Scholar 

  12. Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C (2018) A review of lightweight block ciphers. J Cryptogr Eng 8:141–184

    Article  Google Scholar 

  13. Al-ahdal A, Deshmukh N (2020) A systematic technical survey of lightweight cryptography on IoT environment. Int J Sci Technol Res

    Google Scholar 

  14. Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: a ultra-lightweight blockcipher. Cryptographic hardware and embedded systems (CHES). Lecture Note in Computer Science, vol 6917, pp 342–357. Springer

    Google Scholar 

  15. Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45(1):1–12

    Article  Google Scholar 

  16. Venugopal V, Shila DM (2013) High throughput implementations of cryptography algorithms on GPU and FPGA. In: IEEE international instrumentation and measurement technology conference (I2MTC)

    Google Scholar 

  17. Kousalya RK, Sathish GA (2019) A survey of light-weight cryptographic algorithm for information security and hardware efficiency in resource constrained devices. In: International conference on vision towards emerging trends in communication and networking

    Google Scholar 

  18. Jadhav SP (2019) Towards light weight cryptography schemes for resource constraint devices in IoT. J Mob Multimed 15:91–110

    Google Scholar 

  19. Sardar ZA, Merkel S, Arellano A (2020) https://www.maximintegrated.com/en/design/blog/why-hardware-based-cryptography-offers-stronger-iot-design-protection.html.maximintegrated. Accessed 18 Aug 2020

  20. Hussain HN, Hussein WN (2017) Implementation of symmetric encryption algorithms, computer engineering and intelligent systems, vol 8

    Google Scholar 

  21. Stallings W (2017) Cryptography and network security, 4/E. Tata McGraw Hill Education private limited, Pearson Education, India

    Google Scholar 

  22. De Cannière C, Dunkelman O, Knežević M (2009) KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers, cryptographic hardware and embedded systems, Springer, pp 272–288

    Google Scholar 

  23. Priya SSS, Karthigaikumar P, Teja NR (2021) FPGA implementation of AES algorithm for high speed applications. Analog Integr Circ Sig Process

    Google Scholar 

  24. Lake B, Kinsy LM (2018) Hardening AES hardware implementations against fault and error inject attacks. In: Lakes symposium on VLSI (GLSVLSI ‘18). Association for Computing Machinery, pp 499–502. New York, NY, USA, 499–502

    Google Scholar 

  25. Gong TZ, G¨uneysu T, Heyse S, Indesteege S, Ker-ckhof S, Koeune F, Nad T, Plos T, Regazzoni F, Koeune F, Standaert F (2012) Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: International conference on cryptology in Africa. Springer, pp 172–187

    Google Scholar 

  26. Castiglione A, Palmieri F, Colace F, Lombardi M, Santaniello D, D’Aniello G (2020) Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn Lett 135:264–270

    Article  Google Scholar 

  27. Lim C, Korkishko T (2006) mCrypton—a lightweight block cipher for security of low-cost RFID tags and sensors, information security applications. In: Song JS, Kwon T, Yung M (eds) Information security applications. WISA 2005. Lecture Notes in Computer Science,Springer Berlin, Heidelberg, vol 3786, pp 243–258

    Google Scholar 

  28. Mathews R, Deepa VJ (2020) Analysis of lightweight cryptographic algorithms for internet of things. Available at SSRN 3734786

    Google Scholar 

  29. Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov A (eds) Fast software encryption. FSE, Springer, Berlin

    Google Scholar 

  30. Shanmugam D, Annadurai S (2015) Secure implementation of stream cipher: Trivium. In: Bica I, Naccache D, Simion E (eds) Innovative security solutions for information technology and communications. Springer

    Google Scholar 

  31. Karmakar S, Mukhopadhyay D, Chowdhury DR (2012) CAvium—strengthening. Trivium Stream Cipher Using Cellular Automata. J Cell Autom 7:179–197

    Google Scholar 

  32. Hell M, Johansson T, Maximov A (2006) A stream cipher proposal, Grain-128. In: IEEE international symposium on information theory, Seattle, WA, pp 1614–1618

    Google Scholar 

  33. Shamir A, Kaisa N (2008) SQUASH—a new mac with provable security properties for highly constrained devices such as RFID tags. In: Fast software encryption, Springer, Lausanne, Switzerland, vol 5086, pp 144–157

    Google Scholar 

  34. Kumar N, Ojha S, Jain K, Lal S (2009) BEAN: a lightweight stream cipher. In: 2nd international conference on security of information and networks (SIN ’09), Gazimagusa, North Cyprus, pp 168–171

    Google Scholar 

  35. Agren M (2012) On some symmetric lightweight cryptographic designs. Doctoral Thesis, Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University

    Google Scholar 

  36. Gunathilake NA, Buchanan WJ, Asif R (2019) Next generation lightweight cryptography for smart IoT devices: implementation, challenges and applications. In: IEEE 5th world forum on internet of things (WF-IoT), pp 707–710

    Google Scholar 

  37. Naito Y, Matsui M, Sugawara T, Suzuki D (2018) SAEB: a lightweight blockcipher-based AEAD mode of operation. In: IACR translation cryptographic hardware and embedded systems, pp 192–217

    Google Scholar 

  38. Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2014) RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms. IACR Cryptol. ePrint Arch

    Google Scholar 

  39. Rana S, Hossain S, Shoun HI, Kashem MA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int J Adv Comp Sci Appl (IJACSA)

    Google Scholar 

  40. Kitsos P, Sklavos N, Parousi M, Skodras AN (2012) A comparative study of hardware architectures for lightweight block ciphers. Comput Electr Eng 38:148–160

    Article  Google Scholar 

  41. Irwin D, Liu P, Chaudhry SR, Collier M, Wang X (2018) A performance comparison of the PRESENT lightweight cryptography algorithm on different hardware platforms. In: 29th Irish signals and systems conference (ISSC), Belfast, pp 1–5

    Google Scholar 

  42. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test Comput 24:522–533

    Article  Google Scholar 

  43. Diehl W, Farahmand F, Yalla P, Kaps J, Gaj K (2017) Comparison of hardware and software implementations of selected lightweight block ciphers. In: 27th international conference on field programmable logic and applications (FPL), pp 1–4

    Google Scholar 

  44. Al-Aali Y, Boussakta S (2020) Lightweight block ciphers for resource-constrained devices. In: 12th international symposium on communication systems, networks and digital signal processing (CSNDSP), pp 1–6

    Google Scholar 

  45. Prabu M, Nenregen R, Kumar SS (2018) Comparing lightweight algorithms for embedded system security. Int J Pure Appl Mathe 119:14191–14198

    Google Scholar 

  46. Alizadeh M, Salleh M, Zamani M, Shayan J, Karamizadeh S (2012) Security and performance evaluation of lightweight cryptographic algorithms in RFID. In: WSEAS conference on recent researches in communications and computers, Kos Island, Greece, pp 45–50

    Google Scholar 

  47. Thorat CG, Inamdar VS (2018) Implementation of new hybrid lightweight cryptosystem. Appl Comput Inform 16:195–206

    Article  Google Scholar 

  48. Hong D, Lee JK, Kim DC, Kwon D, Ryu KH, Lee DG (2014) LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim Y, Lee H, Perrig A (eds) WISA 2013.LNCS, vol 8267, pp 3–27. Springer, Cham

    Google Scholar 

  49. Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, Camellia, and Triple-DES. In: Boyd C, Mao W (eds) Information security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin

    Google Scholar 

  50. Mohd BJ, Hayajneh T, Khalaf ZA, Ahmad Yousef KM (2016) Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. Secur Commun Netw 9:2200–2216

    Google Scholar 

  51. Léglise P, Standaer FX, Rouvroy G, Quisquater JJ (2005) Efficient implementation of recent stream ciphers on reconfigurable hardware devices. In: 26th symposium on information theory in the Benelux, pp 261–268

    Google Scholar 

  52. Piret G, Roche T, Carlet C (2012) PICARO—a block cipher allowing efficient higher-order side-channel resistance. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security. ACNS

    Google Scholar 

  53. Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 4th international conference on signal processing, computing and control (ISPCC). doi: https://doi.org/10.1109/ISPCC.2017.8269731

  54. Ravi S, Raghunathan A, Kocher P, Hattangady S (2004) Security in embedded systems. ACM Trans Embed Comput Syst 3:461–491

    Article  Google Scholar 

  55. Naru ER, Saini H, Sharma M (2017) A recent review on lightweight cryptography in IoT. In: International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp 887–890, Palladam, India

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. P. Sandhya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sandhya, C.P., Manjith, B.C. (2022). Challenging Aspects of Data Preserving Algorithms in IoT Enabled Smart Societies. In: Srinivasa, K.G., Siddesh, G.M., Manisekhar, S.R. (eds) Society 5.0: Smart Future Towards Enhancing the Quality of Society. Advances in Sustainability Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2161-2_6

Download citation

Publish with us

Policies and ethics