Abstract
Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet of Things (IoT) is a cutting edge technology which is developed for resource constrained devices for communicating and sharing of information among fellow devices over internet. IoT smart objects are smallest tiny devices and it has limited processing and storage capacities and that often runs on small, low power, battery. IoT devices have many issues and challenges due to inherent properties of IoT and one of the major challenges is security. Success of IoT depends on how smart devices countermeasure the different security attacks. There are many cryptographic algorithms with different services are exist. Each one has some unique properties as well as limitations or constraints. After studying these cryptographic algorithms, the authors decided to propose a new lightweight block cipher, PriPresent. Also, this paper depicts the comparison results of proposed cipher with existing cipher over different metrics.













Similar content being viewed by others
Abbreviations
- h1e :
-
hash value of text at encryption
- h2e :
-
hash value of credentials at encryption
- h:
-
hash function
- H:
-
Hash value of h1e and h2e
- h1d :
-
hash value of text at decryption
- h2d :
-
hash value of credentials at decryption
- IRt :
-
Identity of tag
- IRr :
-
Identity of reader
- St :
-
Tag sequence number
- Sr :
-
Reader sequence number
- Ct :
-
Cipher text
- CK :
-
Cipher key
- M:
-
message
- E:
-
Encryption
- D:
-
Decryption
- Au:
-
Authentication
- ⨁:
-
Exclusive-OR Operation
- Rt :
-
Registration of RFID Tag
- Rr :
-
Registration of RFID Reader
- DBS:
-
Data Base Server
- II:
-
Concatenation operation
- Id:
-
Identity of device
- CH1, CHn :
-
Confidentiality tied with authentication
- Rrt :
-
Registration of Tag and Reader
- D:
-
Date
- T:
-
Time
References
Miorandi D, Sicari S, de Pellegrini F, Chlamtac I (2012) Survey internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516
Jadhav SP (2020) Towards Light Weight Cryptography schemes for Resource Constraint Devices in IoT. J Mobile Multimed 15(1):91110. https://doi.org/10.13052/jmm1550-4646.15125
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead, Elsevier. Comput Networks 76:146–164
Zhang J, Varadharajan V (2010) Security and privacy in sensor networks. J Network Comput Appl 33(2):63–75
Kumarkushwaha P et al (2014) A Survey on Lightweight Block Ciphers. Int J Comput Appl 96(17):1–7
Husamuddin et al (2017) Internet of Things: A study on security and privacy threats. 2nd International Conference on Anti-CyberCrimes (ICACC), Abha, pp 26–27
Chan S et al (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44
Zhou et al (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251
Duka et al (2017) Implementation of SIMON and SPECK lightweight block ciphers on programmable logic controllers, Digital Forensic and Security (ISDFS), 5th IEEE International Symposium on, pp1–6
Du W et al (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Security 8(2):228–258
Liu Y, Chen Z, Xia F, Lv X, Bu F (2012) An integrated scheme based on service classification in pervasive mobile services. Int J Commun System 25(9):1178–1188
Wang Y et al (2014) Middleware development method for internet of things. J Liaoning Tech Univ (Nat Sci Ed) 33(5):675–678
Isha et al (2016) Analysis of Lightweight Cryptographic Solutions for Internet of Things. Indian J Sci Technol 9:28
Suo H et al (2012) Security in the internet of things: a review. IEEE Int Confer Comput Sci Electron Eng. https://doi.org/10.1109/ICCSEE.2012.373
Kumarkushwaha P et al (2014) A survey on lightweight block ciphers. Int J Comput Appl 96(17):1–7
Yang G et al (2010) Security characteristics and technology in the internet of things. J Nanjing Univ Posts Telecomm (Nat Sci) 30(4)
Ding C, Yang LJ, Wu M (2011) Security architecture and key technologies for IoT/CPS”, ZTE Technol J 17(1)
Ankitha S et al (2016) Security and privacy issues in IoT. SCIREA J Agric 1(2)
Kortuem G, Kawsar F, Sundramoorthy V, Fitton D (2010) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14(1):44–51
Karlof C, Wagner D (2003) Secure routing in sensor networks: attacks and countermeasures, Elsevier, AdHoc Networks J, Special Issue on Sensor Network, 293–315
Goyal V (2006) A new protocol to counter online dictionary attacks, computers and security. Elsevier Sci 25(2):114–120
Vasudevan RA et al (2004) Jigsaw-based Secure Data Transfer overComputer Networks, vol 1. IEEE International Conference on Information Technology: Coding and Computing, Proceedings of ITCC 2004, Las Vegas, pp 2–6
Sathish Kumar J et al (2014) Survey on internet of things: security and privacy issues. Int J Comput Appl 90(11)
Zhao W, Wang C, Nakahira Y (2011) Medical Application On IoT, International Conference on Computer Theory and Applications (ICCTA), pp 660–665
Giannikos M, Korina K, Fotiou N, Marias GF, Polyzos GC (2013) Towards secure and context-aware information lookup for the Internet of Things. Int. Conf. on Computing, Networking and Communications (ICNC,) Proceedings of IEEE, pp 632–636
Da Xu L (2013) Internet of things in industries: a survey. IEEE Trans Indust Informatics 10:1551–3203. https://doi.org/10.1109/TII.2014.2300753
Rao BP et al (2012) Cloud computing for Internet of Things & sensing based applications”, Proceedings of 2012 Sixth International Conference on Sensing Technology (ICST), pp 374–380
Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y, Yan J, Zhang H (2014) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Indust Informatics 10(1):548–558
Swathi E et al (2016) Role of hash function in cryptography, international journal of advanced engineering research and science, special issue (NCCSIGMA-16), ISSN: 2349–6495(P),2456–1908(O)
Venugopal M (2017) Lightweight cryptographic Solution for IoT- an Assessment. Int J Pure Appl Mathematics 117(16):511–516
Singh AK, Patro BDK (2017) Performance Comparison of Signcryption Schemes – A Step towards Designing Lightweight Cryptographic Mechanism”, International Journal of Engineering and Technology (IJET), 9(2), ISSN (Online): 0975–4024
Ullah S et al (2017) A Review of Signcryption Schemes Based on Hyper Elliptic Curve, 3rd IEEE International Conference on Big Data Computing and Communications: 978–1-5386- 3349-6/17
Hammad Bt (2017) Implementation of Lightweight Cryptographic Primitives, J Theoret Appl Information Tech 95(19)
Bhagoliwal S, Karjee J (2016) Securing mobile data using cryptography. Int J Adv Networking Appl 7:2925–2930
Chakraborty S (2000) A statistical analysis of an algorithm’s complexity. Appl Math Letter 13:121–126
Liu Z et al (2017) Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput 66(5):773–785
Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: lightweight attestation and authentication of low resource things in IoT and CPS. Comp Network 134:167–182
Miloslavskaya N, Tolstoy A (2019) Internet of things: information security challenges and solutions. Cluster Comput 22(1):103–119
Sen et al (2018) TRIFECTA: security, energy efficiency, and Communication Capacity Comparison for wireless IoT Device. IEEE Internet Comput 22:74–81
Tangade et al (2016) Scalable and privacy-preserving authentication protocol for secure vehicular comm.”, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bangalore, India
Neto et al (2016) AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, New York, pp 1–15
Bringer et al (2006) HB++: A Lightweight Authentication Protocol Secure against Some Attacks”, IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
Peris-Lopez et al (2006) LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags, proc. of 2nd Workshop on RFID Security
Puthal D et al (2016) A dynamic prime number based efficient security mechanism for big sensing data streams, Elsevier. J Comput Syst Sci. https://doi.org/10.1016/j.jcss.2016.02.005
Qureshi R (2016) Review on security using Colours and Armstrong numbers. Int J Innovat Res Comput Commun Eng 4(3)
Harikrishna et al (2019) Safe Light Weight Cipher using Ethernet and Pentatop Number. I J Recent Technol Eng (IJRTE), ISSN: 2277–3878, 8(2)
Usman M et al (2017) SIT: A lightweight encryption algorithm for secure internet of things, (IJACSA) Int J Adv Comput Sci Appl 8(1)
Kaur M et al (2011) RFID technology principles, advantages, limitations & its applications. Int J Comput Electric Eng 3(1):151–157
Hemraj Shobharam Lamkuche et al. (2019) SAL – A Lightweight Symmetric Cipher for Internet of Things. Int J Innov Technol Explor Eng 8(11S) ISSN: 2278–3075
Bhardwaj I et al (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs”,4th international conference on signal processing, computing and control (ISPCC 2k17), Solan, India
Girija et al (2020) DIBPresent: a dynamic integer based LightWeight cryptography for resource constrained devices. Int J Adv Sci Technol 29(8s):721–729
Manickam et al (2018) Routing Schemes and Protocols for Internet of Things: A Review. Int J Theoret Appl Sci, ISSN No. (Print):0975–1718 ISSN No. (Online): 2249–3247 10(1):81–85
Ramaswami M et al (2019) Comprehensive Analysis on Lightweight Cryptographic Algorithms for Low Resource Devices, TEST Engineering & Management, pp 3747–3760
Manimegalai D et al (2013) A study of recent researches in Energy Efficient routing protocols for battery constrained Mobile ad hoc networks. Int J Adv Eng Sci Technol 2(1)
Manickam et al (2015) A Highly Adaptive Fault Tolerant Source Routing Protocol for Energy Constrained Mobile Ad Hoc Networks, Int J Appl Eng Res ISSN 0973–4562, 10(7) pp 16885–16897
Bassam J, Mohd et al (2016) Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access, 4. https://doi.org/10.1109/ACCESS.2018.2848586
Kotel et al. (2017) Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices”, IDEAS '17, July 12–14, 2017, Bristol, United Kingdom, ACM ISBN 978–1–4503-5220-8/17/07
Mohanty SN, Ramya KC, Rani SS, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Generat Comput Syst 102:1027–1037
Manickam P, Shankar K, Eswaran Perumal, M Ilayaraja, K Sathesh Kumar (2019) Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography”, Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments, Adv Sci Technol Secur Appl, ISBN: 978–3–030-16837-7: 193–204
Shankar K, Mohamed Elhoseny Secure Image Transmission in Wireless Sensor Network (WSN) Applications, Lecture Notes in Electrical Engineering: 564, eBook ISBN: 978–3–030-20816-5, Publisher: Springer International Publishing, 2019
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications
Guest Editor: Ching-Hsien Hsu
Rights and permissions
About this article
Cite this article
Girija, M., Manickam, P. & Ramaswami, M. PriPresent: an embedded prime LightWeight block cipher for smart devices. Peer-to-Peer Netw. Appl. 14, 2462–2472 (2021). https://doi.org/10.1007/s12083-020-00992-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00992-5