Skip to main content

Advertisement

Log in

PriPresent: an embedded prime LightWeight block cipher for smart devices

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet of Things (IoT) is a cutting edge technology which is developed for resource constrained devices for communicating and sharing of information among fellow devices over internet. IoT smart objects are smallest tiny devices and it has limited processing and storage capacities and that often runs on small, low power, battery. IoT devices have many issues and challenges due to inherent properties of IoT and one of the major challenges is security. Success of IoT depends on how smart devices countermeasure the different security attacks. There are many cryptographic algorithms with different services are exist. Each one has some unique properties as well as limitations or constraints. After studying these cryptographic algorithms, the authors decided to propose a new lightweight block cipher, PriPresent. Also, this paper depicts the comparison results of proposed cipher with existing cipher over different metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.
Fig. 11
Fig. 12.
Fig. 13.

Similar content being viewed by others

Abbreviations

h1e :

hash value of text at encryption

h2e :

hash value of credentials at encryption

h:

hash function

H:

Hash value of h1e and h2e

h1d :

hash value of text at decryption

h2d :

hash value of credentials at decryption

IRt :

Identity of tag

IRr :

Identity of reader

St :

Tag sequence number

Sr :

Reader sequence number

Ct :

Cipher text

CK :

Cipher key

M:

message

E:

Encryption

D:

Decryption

Au:

Authentication

⨁:

Exclusive-OR Operation

Rt :

Registration of RFID Tag

Rr :

Registration of RFID Reader

DBS:

Data Base Server

II:

Concatenation operation

Id:

Identity of device

CH1, CHn :

Confidentiality tied with authentication

Rrt :

Registration of Tag and Reader

D:

Date

T:

Time

References

  1. Miorandi D, Sicari S, de Pellegrini F, Chlamtac I (2012) Survey internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

    Article  Google Scholar 

  2. Jadhav SP (2020) Towards Light Weight Cryptography schemes for Resource Constraint Devices in IoT. J Mobile Multimed 15(1):91110. https://doi.org/10.13052/jmm1550-4646.15125

    Article  Google Scholar 

  3. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead, Elsevier. Comput Networks 76:146–164

    Article  Google Scholar 

  4. Zhang J, Varadharajan V (2010) Security and privacy in sensor networks. J Network Comput Appl 33(2):63–75

    Article  Google Scholar 

  5. Kumarkushwaha P et al (2014) A Survey on Lightweight Block Ciphers. Int J Comput Appl 96(17):1–7

    Google Scholar 

  6. Husamuddin et al (2017) Internet of Things: A study on security and privacy threats. 2nd International Conference on Anti-CyberCrimes (ICACC), Abha, pp 26–27

    Google Scholar 

  7. Chan S et al (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44

    Article  Google Scholar 

  8. Zhou et al (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251

    Article  Google Scholar 

  9. Duka et al (2017) Implementation of SIMON and SPECK lightweight block ciphers on programmable logic controllers, Digital Forensic and Security (ISDFS), 5th IEEE International Symposium on, pp1–6

  10. Du W et al (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Security 8(2):228–258

    Article  Google Scholar 

  11. Liu Y, Chen Z, Xia F, Lv X, Bu F (2012) An integrated scheme based on service classification in pervasive mobile services. Int J Commun System 25(9):1178–1188

    Article  Google Scholar 

  12. Wang Y et al (2014) Middleware development method for internet of things. J Liaoning Tech Univ (Nat Sci Ed) 33(5):675–678

    Google Scholar 

  13. Isha et al (2016) Analysis of Lightweight Cryptographic Solutions for Internet of Things. Indian J Sci Technol 9:28

    Article  Google Scholar 

  14. Suo H et al (2012) Security in the internet of things: a review. IEEE Int Confer Comput Sci Electron Eng. https://doi.org/10.1109/ICCSEE.2012.373

  15. Kumarkushwaha P et al (2014) A survey on lightweight block ciphers. Int J Comput Appl 96(17):1–7

    Google Scholar 

  16. Yang G et al (2010) Security characteristics and technology in the internet of things. J Nanjing Univ Posts Telecomm (Nat Sci) 30(4)

  17. Ding C, Yang LJ, Wu M (2011) Security architecture and key technologies for IoT/CPS”, ZTE Technol J 17(1)

  18. Ankitha S et al (2016) Security and privacy issues in IoT. SCIREA J Agric 1(2)

  19. Kortuem G, Kawsar F, Sundramoorthy V, Fitton D (2010) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14(1):44–51

    Article  Google Scholar 

  20. Karlof C, Wagner D (2003) Secure routing in sensor networks: attacks and countermeasures, Elsevier, AdHoc Networks J, Special Issue on Sensor Network, 293–315

  21. Goyal V (2006) A new protocol to counter online dictionary attacks, computers and security. Elsevier Sci 25(2):114–120

    Google Scholar 

  22. Vasudevan RA et al (2004) Jigsaw-based Secure Data Transfer overComputer Networks, vol 1. IEEE International Conference on Information Technology: Coding and Computing, Proceedings of ITCC 2004, Las Vegas, pp 2–6

    Google Scholar 

  23. Sathish Kumar J et al (2014) Survey on internet of things: security and privacy issues. Int J Comput Appl 90(11)

  24. Zhao W, Wang C, Nakahira Y (2011) Medical Application On IoT, International Conference on Computer Theory and Applications (ICCTA), pp 660–665

  25. Giannikos M, Korina K, Fotiou N, Marias GF, Polyzos GC (2013) Towards secure and context-aware information lookup for the Internet of Things. Int. Conf. on Computing, Networking and Communications (ICNC,) Proceedings of IEEE, pp 632–636

  26. Da Xu L (2013) Internet of things in industries: a survey. IEEE Trans Indust Informatics 10:1551–3203. https://doi.org/10.1109/TII.2014.2300753

    Article  Google Scholar 

  27. Rao BP et al (2012) Cloud computing for Internet of Things & sensing based applications”, Proceedings of 2012 Sixth International Conference on Sensing Technology (ICST), pp 374–380

  28. Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y, Yan J, Zhang H (2014) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Indust Informatics 10(1):548–558

    Article  Google Scholar 

  29. Swathi E et al (2016) Role of hash function in cryptography, international journal of advanced engineering research and science, special issue (NCCSIGMA-16), ISSN: 2349–6495(P),2456–1908(O)

  30. Venugopal M (2017) Lightweight cryptographic Solution for IoT- an Assessment. Int J Pure Appl Mathematics 117(16):511–516

    Google Scholar 

  31. Singh AK, Patro BDK (2017) Performance Comparison of Signcryption Schemes – A Step towards Designing Lightweight Cryptographic Mechanism”, International Journal of Engineering and Technology (IJET), 9(2), ISSN (Online): 0975–4024

  32. Ullah S et al (2017) A Review of Signcryption Schemes Based on Hyper Elliptic Curve, 3rd IEEE International Conference on Big Data Computing and Communications: 978–1-5386- 3349-6/17

  33. Hammad Bt (2017) Implementation of Lightweight Cryptographic Primitives, J Theoret Appl Information Tech 95(19)

  34. Bhagoliwal S, Karjee J (2016) Securing mobile data using cryptography. Int J Adv Networking Appl 7:2925–2930

    Google Scholar 

  35. Chakraborty S (2000) A statistical analysis of an algorithm’s complexity. Appl Math Letter 13:121–126

    Article  MathSciNet  Google Scholar 

  36. Liu Z et al (2017) Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput 66(5):773–785

    Article  MathSciNet  Google Scholar 

  37. Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: lightweight attestation and authentication of low resource things in IoT and CPS. Comp Network 134:167–182

    Article  Google Scholar 

  38. Miloslavskaya N, Tolstoy A (2019) Internet of things: information security challenges and solutions. Cluster Comput 22(1):103–119

    Article  Google Scholar 

  39. Sen et al (2018) TRIFECTA: security, energy efficiency, and Communication Capacity Comparison for wireless IoT Device. IEEE Internet Comput 22:74–81

    Article  Google Scholar 

  40. Tangade et al (2016) Scalable and privacy-preserving authentication protocol for secure vehicular comm.”, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bangalore, India

  41. Neto et al (2016) AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, New York, pp 1–15

    Google Scholar 

  42. Bringer et al (2006) HB++: A Lightweight Authentication Protocol Secure against Some Attacks”, IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing

  43. Peris-Lopez et al (2006) LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags, proc. of 2nd Workshop on RFID Security

  44. Puthal D et al (2016) A dynamic prime number based efficient security mechanism for big sensing data streams, Elsevier. J Comput Syst Sci. https://doi.org/10.1016/j.jcss.2016.02.005

  45. Qureshi R (2016) Review on security using Colours and Armstrong numbers. Int J Innovat Res Comput Commun Eng 4(3)

  46. Harikrishna et al (2019) Safe Light Weight Cipher using Ethernet and Pentatop Number. I J Recent Technol Eng (IJRTE), ISSN: 2277–3878, 8(2)

  47. Usman M et al (2017) SIT: A lightweight encryption algorithm for secure internet of things, (IJACSA) Int J Adv Comput Sci Appl 8(1)

  48. Kaur M et al (2011) RFID technology principles, advantages, limitations & its applications. Int J Comput Electric Eng 3(1):151–157

    Article  MathSciNet  Google Scholar 

  49. Hemraj Shobharam Lamkuche et al. (2019) SAL – A Lightweight Symmetric Cipher for Internet of Things. Int J Innov Technol Explor Eng 8(11S) ISSN: 2278–3075

  50. Bhardwaj I et al (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs”,4th international conference on signal processing, computing and control (ISPCC 2k17), Solan, India

  51. Girija et al (2020) DIBPresent: a dynamic integer based LightWeight cryptography for resource constrained devices. Int J Adv Sci Technol 29(8s):721–729

    Google Scholar 

  52. Manickam et al (2018) Routing Schemes and Protocols for Internet of Things: A Review. Int J Theoret Appl Sci, ISSN No. (Print):0975–1718 ISSN No. (Online): 2249–3247 10(1):81–85

    Google Scholar 

  53. Ramaswami M et al (2019) Comprehensive Analysis on Lightweight Cryptographic Algorithms for Low Resource Devices, TEST Engineering & Management, pp 3747–3760

  54. Manimegalai D et al (2013) A study of recent researches in Energy Efficient routing protocols for battery constrained Mobile ad hoc networks. Int J Adv Eng Sci Technol 2(1)

  55. Manickam et al (2015) A Highly Adaptive Fault Tolerant Source Routing Protocol for Energy Constrained Mobile Ad Hoc Networks, Int J Appl Eng Res ISSN 0973–4562, 10(7) pp 16885–16897

  56. Bassam J, Mohd et al (2016) Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access, 4. https://doi.org/10.1109/ACCESS.2018.2848586

  57. Kotel et al. (2017) Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices”, IDEAS '17, July 12–14, 2017, Bristol, United Kingdom, ACM ISBN 978–1–4503-5220-8/17/07

  58. Mohanty SN, Ramya KC, Rani SS, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Generat Comput Syst 102:1027–1037

  59. Manickam P, Shankar K, Eswaran Perumal, M Ilayaraja, K Sathesh Kumar (2019) Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography”, Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments, Adv Sci Technol Secur Appl, ISBN: 978–3–030-16837-7: 193–204

  60. Shankar K, Mohamed Elhoseny Secure Image Transmission in Wireless Sensor Network (WSN) Applications, Lecture Notes in Electrical Engineering: 564, eBook ISBN: 978–3–030-20816-5, Publisher: Springer International Publishing, 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Girija.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications

Guest Editor: Ching-Hsien Hsu

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Girija, M., Manickam, P. & Ramaswami, M. PriPresent: an embedded prime LightWeight block cipher for smart devices. Peer-to-Peer Netw. Appl. 14, 2462–2472 (2021). https://doi.org/10.1007/s12083-020-00992-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00992-5

Keywords

Navigation