0% found this document useful (0 votes)
46 views9 pages

Ijetae 0124 05

The document discusses security challenges for wireless IoT networks and lightweight encryption. It provides an overview of security issues like different types of attacks on IoT networks. It also covers challenges of implementing encryption on resource-constrained IoT devices and the need for lightweight and secure cryptography solutions.

Uploaded by

Malek Jedidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views9 pages

Ijetae 0124 05

The document discusses security challenges for wireless IoT networks and lightweight encryption. It provides an overview of security issues like different types of attacks on IoT networks. It also covers challenges of implementing encryption on resource-constrained IoT devices and the need for lightweight and secure cryptography solutions.

Uploaded by

Malek Jedidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

Wireless IoT Networks Security and Lightweight Encryption


Schemes- Survey
Akram Qashou 1, Firas Hazzaa 2, Sufian Yousef 3
Faculty of Science and Engineering, Anglia Ruskin University, Chelmsford, UK

Abstract— IoT networks suffered from different kinds of attacks. cryptography enforcement should be lightweight and secure.
The main issue of IoT security is the limitation of its node’s The most important principle of security is confidentiality,
energy ability to perform big tasks such as encryption. This
paper provides a comprehensive overview of the dynamic which can be reached by using cryptography algorithms. These
landscape of lightweight cryptography research, particularly in algorithms have been employing in many applications and
the context of real-time traffic security and Internet of Things methods to govern the security demands. Therefore, this
(IoT) networks. The aim of this research is to identify the gaps in
feature has made the encryption/decryption essential in
IoT research efforts and draw up ways to address it. The
objectives are highlighting the global collaboration and security.
standardization initiatives that have shaped its development.
Also, it emphasizes the importance of balancing cryptographic Presently, a considerable amount of scholarly attention is
strength with practical considerations such as encryption latency, directed towards Real-time Wireless Multimedia Sensor
energy efficiency, and memory constraints, particularly crucial in Networks (WMSNs) due to their capacity to facilitate
the context of resource constrained IoT devices. Furthermore, it numerous application layer services addressing practical issues
highlights innovative approaches proposed by researchers to
enhance the security of cryptographic operations while like health monitoring, transportation management, weather
minimizing overhead and ensuring compatibility with evolving prediction, and safety and security investigations [2]. A
wireless environments. It calls for sustained research efforts to conventional WMSN comprises diverse sensor nodes,
address these challenges and foster the development of robust
cryptographic solutions capable of meeting the stringent security
encompassing both basic and multimedia sensor nodes, along
requirements of modern digital ecosystems. Base Station (BS) as shown in Fig. 1.
Keywords—wireless IoT devices; secure communication; AES
encryption; wireless network security A Wireless Sensor Network (WSN) comprises small sensor
nodes used for monitoring physical or environmental
I. INTRODUCTION conditions wirelessly. In deployments within remote or
Nowadays, the world is rapidly moving toward the inaccessible areas, the likelihood of various types of attacks
wireless networks, in an IoT setting, wireless sensor networks increases significantly, emphasizing the critical importance of
(WSNs) stand out as a crucial technological component. WSN security. Given that sensors possess constrained
According to [1], WSN in IoT refers to a wireless network processing power, storage, bandwidth, and energy,
devoid of infrastructure and self-configured, designed to conventional security measures tailored for resource-abundant
monitor various physical or environmental factors such as networks like LAN are not directly applicable.
temperature, sound, vibration, pressure, motion, or pollutants.
Security, efficiency, and energy consumption pose ongoing
These networks collaboratively transmit collected data to a
challenges in wireless sensor networks (WSNs), given their
central location or sink for observation and analysis.
large-scale, resource-constrained, and open characteristics. The
However, security of the connections between nodes over development of the 6LoWPAN protocol and other lightweight
the IoT is the main challenge in such networks. The critical cryptographic techniques aims to bolster the security and
challenge for supporting voice applications in the wireless IoT efficiency of WSNs while minimizing energy and resource
networks is finding a security solution that meets the needs of usage. However, these solutions still grapple with limitations
these applications such as latency, and not consume power of concerning flexibility, key management, authentication, and
battery quickly. The solution for these issues is that any power resource management protocols. [1].

28
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

or theft of critical information [3]. Also, spoofing attacks


involve devices being linked to the network, either directly or
via a gateway, within the IoT architecture. In this scenario, an
assailant could physically seize the node or gateway and
substitute or reprogram it with malicious code. To mitigate
such threats, it's crucial to authenticate edge devices and
gateways while encrypting data to thwart such attacks.
Key attacks occur when certain devices possess pre-shared
keys embedded directly within the code, making it susceptible
to exploitation by intruders who can easily intercept this
Fig. 1:Wireless Sensor Network [5]
information [4]. In addition, Traffic analysis, yet another form
Nonetheless, ensuring the security of connections between of passive attack, involves extracting valuable information
devices and networks is paramount. As indicated by Steve from network traffic, including source and destination details
Morgan [4], the expenditure on cybersecurity soared to $84 contained within the transmitted communication headers.
billion in 2015 and is projected to escalate to $125 billion by Furthermore, A brute-force attack, often termed an exhaustive
2020. Security concerns pose significant challenges for search, is a cryptographic technique reliant on attempting
enabling real-time applications in wireless networks. various possible patterns of a targeted password in order to
Regrettably, conventional multimedia traffic management uncover the correct one. Finally, Man-in-the-middle attacks
algorithms, primarily crafted to ensure adherence to delay and exploit the diverse structure of IoT architecture, enabling
distortion constraints, often overlook security requisites. intruders to clandestinely intercept communications between
Consequently, this oversight renders them increasingly two parties, thereby eavesdropping on or altering the traffic
vulnerable to various attacks such as eavesdropping and data passing between them. This type of attack can result in the
tampering. Conversely, inherent limitations within wireless capture of personal information and login credentials, as well
devices, such as restricted computational power and energy as the disruption of communications and corruption of data [5].
resources, pose challenges for the integration of contemporary The primary tenet of security revolves around
security and cryptography algorithms. Implementing confidentiality, a goal typically attained through encryption.
encryption algorithms proves arduous due to their substantial Encryption algorithms find widespread utility across various
consumption of computing resources, including CPU time and applications and protocols, serving to encrypt data during its
battery power in mobile devices [1]. Additionally, the transmission within networks. Moreover, encryption can
transmission of voice over wireless channels is pivotal, given extend to safeguarding IP addresses, routing information, and
its real-time nature, rendering it particularly sensitive to delays. request-response packets exchanged between wireless nodes.
The network layer, also known as the transit layer, manages Such capabilities underscore the pivotal role of encryption in
and securely directs data flow within the IoT framework. bolstering cybersecurity measures.
Utilizing protocols such as Zigbee, Bluetooth, IR, and
6LowPan, this layer facilitates data transmission. To facilitate Numerous prior research endeavors have tackled security
further processing and action, the network layer relies on the concerns associated with real-time traffic, yielding algorithms
middleware layer. Various potential attacks can target this aimed at mitigating issues like delays inherent in such
layer. scenarios. However, the applicability of these research findings
to wireless networks is limited due to the stringent demands
Eavesdropping, characterized as a passive attack, involves they impose, including constraints on delays, throughput, and
extracting message contents from network broadcasts. This power consumption within network nodes, often due to power
method entails snooping, capturing, and sniffing out limitations. In network security and encryption, there exists a
broadcasted data, allowing for the initiation of various attacks perpetual tradeoff between Quality of Service (QoS) and the

29
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

level of security. This implies that achieving heightened in operations conducted over a finite field [4]. The AES
security often entails consuming more time and energy, and encryption algorithm consists of four fundamental
conversely, prioritizing efficiency may compromise security. transformations: AddRoundKey, SubBytes, ShiftRows, and
Unfortunately, these aspects have not been adequately MixColumns.
addressed in the majority of network security environments.
II. SECURITY APPLICATIONS
A. Cryptography Apllications
Apart from encrypting data, cryptosystems find various
applications in network environments. This section delineates
several examples of network security, underscoring the
significance of employing encryption for bolstering internet
and network security as well as preserving privacy.
This section delves into the challenges associated with
integrating IPsec encryption into VOIP services. As per the
National Institute of Standards and Technology (NIST, April
2004), while firewalls, gateways, and similar devices play a
role in safeguarding networks against external threats, they
offer no protection against internal hackers. Consequently, an
additional layer of protection at the protocol level is deemed
necessary to defend the data itself. In the context of Voice over
Internet Protocol (VOIP), this can be achieved by encrypting
packets at the IP layer using IPsec. Nevertheless, the
cryptographic operation itself may introduce significant latency
in VOIP packet delivery, resulting in deteriorated voice quality.
Fig. 2:AES algorithm Consequently, there exists a trade-off between voice quality
and security, emphasizing the imperative for speed.
The Advanced Encryption Standard (AES) is a symmetric
block cipher operating in rounds [2]. Due to significant  Internet Protocol Security IPsec
advancements in science and technology, as well as the IPsec, a network protocol suite, serves to authenticate and
increasing necessity to exchange information securely over encrypt data packets transmitted over a network, playing a
communication channels, the Data Encryption Standard (DES) crucial role in ensuring data privacy. It employs cryptographic
is no longer adequate for modern demands. In response, the security services to safeguard communications over the
National Institute of Standards and Technology (NIST) Internet Protocol.
introduced a new standardization in 1997 known as AES, also
referred to as Rijndael [3]. IPsec is the preferred method of VPN tunneling over the
internet. It comprises two fundamental protocols:
The AES algorithm comprises four transformation functions: Encapsulating Security Payload (ESP) and Authentication
AddRoundKey, SubByte (substitution byte), MixColumns, and Header (AH) (refer to Figure 3). Both protocols offer
ShiftRows fig.2. It follows an iterative process with varying connectionless integrity, source authentication, and anti-replay
rounds depending on the key length; for key sizes of 128, 192, protection services. The encryption of the original IP address
and 256 bits, the number of rounds is ten, twelve, and fourteen will protect the packet from being attacked by hackers and
respectively. Each plaintext block encrypted in AES is 128 bits would be impossible for them to know the originality of the
long, forming a state matrix. This matrix is depicted as a 4×4 packet. However, there is a dark side of using IPsec especially
square matrix of bytes. The core operations of AES are rooted

30
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

in voice, the findings presented in [21] demonstrate that while mitigate this threat; however, it must be lightweight and
IPSec enhances security, it can diminish VoIP performance by tailored to the constraints of the wireless environment.
increasing delay and CPU usage.
In wireless IoT networks, a notable issue arises from the
fact that not all connected nodes possess adequate
computational resources. This limitation renders tasks such as
data encryption challenging, underscoring the necessity for
lightweight security measures [10]. Power consumption in
wireless IoT networks is intricately linked to processing speed,
primarily due to execution time. Therefore, the number of
Fig. 3:VPN IPsec computations serving as a determinant of processing speed
serves as a metric for assessing lightness. Ensuring privacy
B. Security Issues within IoT environments necessitates a robust security system
In this section, we will provide a concise overview of various that effectively blocks unauthorized access to networked
security concerns, particularly within wireless networks. For private data. Cryptographic mechanisms must prioritize being
example, in a 5G environment, the integration of diverse compact & swift without compromising on security standards.
wireless technologies and service providers operating on an IP-
III. RELATED STUDY
based core network allows mobile devices to switch between
providers and technologies to uphold a high level of (QoS). As Numerous prior research endeavors have been undertaken to
per [13], the rapid vertical handover process and the overall tackle security concerns associated with real-time traffic,
openness of the network render devices vulnerable to various resulting in the development of algorithms aimed at mitigating
vulnerabilities, including access control, communication issues such as delays.
security, data confidentiality, availability, and privacy The paper [1] explores advanced lightweight cryptographic
concerns. Moreover, given that the 5G environment operates
protocols tailored for IoT networks and conducts a comparative
on an IP-based infrastructure, it will be susceptible to all assessment of prevalent modern ciphers. It categorizes the
vulnerabilities inherent to IP protocols. Consequently, ensuring latest algorithms into two main groups: symmetric and
a high standard of security and privacy will be paramount for asymmetric lightweight cryptography. Furthermore, the paper
the successful implementation of 5G networks, as indicated by assesses the security of various recently introduced block
the findings of [17].
cipher and stream cipher algorithms. In its concluding section,
Given that mobile devices remain connected to the network the paper discusses the necessary modifications and
continuously, they become increasingly susceptible to various improvements.
types of attacks, including impersonation, eavesdropping, man- The research and development of lightweight cryptography
in-the-middle, denial of service, replay, and repudiation attacks was initiated in 2004 in Europe through a project, and it has
[6]. "Ensuring a robust (QoS), particularly in minimizing
been revived through the M2M/IoT process. At ISO/IEC JTC
latency, amidst the substantial data flow within a 5G network, 1/SC 27, the international standard ISO/IEC 29192
while concurrently upholding stringent security and privacy "Lightweight Cryptography" was created. The Lightweight
standards, is imperative to thwart the infiltration and rapid Cryptography Project essentially was commenced in 2013 by
dissemination of malicious files among mobile devices" [13]. the U.S. NIST (National Institute of Standards and
Hence, achieving zero-latency communications within Technology), which publishes standards on cryptographic
secure and privacy-centric 5G networks poses significant technologies, [5] stated. In 2017, the NIST made an
challenges [23]. As previously noted, eavesdropping represents announcement regarding a public request for applications of
a critical threat as it compromises data confidentiality and lightweight cryptographies. Numerous studies have been
security. Encryption emerges as the optimal solution to carried out to investigate security concerns pertaining to the

31
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

actual traffic on wireless networks. While a portion of them are derived by creating different compositions of the initial S-
concentrate on the intricacy pertaining to the security method boxes. The sequence of the indices used from the initial S-
and disregard the performance requirements (encryption boxes is determined by the encryption key. In February [9]
latency, energy), others concentrate on building algorithms that introduced a novel approach for implementing the (AES)
are suitable for coping with real-time limits like delays and cost algorithm, enhancing its resistance against differential
saving. electromagnetic and energy analysis while incurring minimal
additional overhead. Their findings demonstrated notable
Another study has been published by [4] introduced a new
security enhancements for certain microprocessor-based
algorithm for generating random S-Box and its inverse S-Box,
security tokens, particularly those with constrained resources
utilizing various irreducible polynomials in the finite field GF
like smart cards. The authors elaborated on power analysis
(28), contrasting with the fixed polynomials employed in the
attacks in their study, illustrating their potential to compromise
AES standard. The AES standard employs the irreducible
the security of cryptographic hardware, including power side-
polynomial m(x) = x^8 + x^4 + x^3 + x + 1, commonly known
channel and electromagnetic (EM) attacks. They also
to potential attackers, for determining the multiplicative
highlighted a crucial observation regarding the vulnerability of
inverse. To address this issue in the proposed algorithm, a
the output from the initial SubBytes operation, which is
distinct irreducible polynomial is utilized for each instance
commonly targeted in practical attacks. This stems from the
within the finite field of GF (28). This polynomial, along with
fact that it is the only function in AES where both data and
the secret key, is transmitted to the receiver to enhance the
cipher key directly interact, a concern that this research aims to
security of the cipher operations. They endeavored to tackle
address. The authors express ongoing concerns about numerous
security issues while maintaining consistent execution time and
unanswered questions regarding the hardware security of
energy consumption, which might not align with the demands
microprocessor-based tokens and hardware security modules,
of the evolving wireless environment.
which continue to pose challenges due to their complexity,
As per research by [6], an adaptable, low-power encryption cost, and the necessity for meticulous implementation.
scheme for Internet of Things devices is recommended. To
In their study, [15] developed an innovative lightweight
overcome the memory and processing capacity constraints of
encryption system utilizing bit permutation instruction group
IoT devices, the system encrypts and decrypts data using a
operations (GRP). They introduced a novel hybrid system that
variable data size and robust logical operations. When it comes
produces more condensed results in memory space and gate
to encryption time, the suggested encryption method has
equivalents, particularly beneficial for embedded security
outperformed AES. A low-power as well as lightweight
applications. The authors frequently emphasized that standard
encryption technique is suggested by the authors in [7] for
algorithms like DES and AES demand extensive memory
safeguarding voice communication over wireless networks.
resources, rendering them impractical for implementation in
The suggested algorithm works well with wireless devices and
embedded system schemes.
satisfies voice traffic requirements. When compared to the
most recent standard algorithm, it can minimise the encryption [11] propose a 5-round AES encryption algorithm tailored
process's execution time and power consumption while for multimedia and real-time applications within (WSNs).
preserving the intended security level. Its considerable time and Their objective was to minimize the execution time of the
energy savings, roughly 35% greater than with the regular AES encryption process to meet the requirements of WSN nodes.
algorithm, combined with a respectable degree of encryption The findings demonstrated a notable reduction in execution
process complexity make it more appropriate for use in time, alongside a security analysis of the histogram indicating
wireless environments. robust encryption strength and randomness. However, the
authors were unaware, from existing literature, of a successful
[8] employed an alternative approach to generate S-boxes,
attack on 7 rounds as claimed by (Bahrak & Aref, July 2008),
utilizing compositions of permutations from predetermined
highlighting the critical aspect of this work in terms of security
sets. Following the selection of these sets, the resultant S-boxes
and cryptanalysis.

32
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

Table 1: Comparing the key points of the provided research endeavors.

Research Endeavor Pros Cons

- Potential overlook of certain performance


- Comparative assessment of prevalent requirements such as encryption latency and
modern ciphers. energy consumption.
[1] Lightweight
Cryptographic Protocols for - Categorization of algorithms into symmetric - Necessary modifications and improvements
IoT Networks and asymmetric lightweight cryptography. might be needed for practical implementation.

- May not fully align with evolving wireless


environment demands in terms of execution time
- Enhanced security through utilization of
and energy consumption.
[4] New Algorithm for distinct irreducible polynomials for each instance
Generating Random S-Box within the finite field of GF (28). - Implementation complexity might increase.

- Adaptable, low-power encryption scheme


suitable for IoT devices.
[6] Low-power
Encryption Scheme for IoT - Outperformed AES in terms of encryption - May require additional testing to ensure
Devices time. robustness and security against potential attacks.

- Significantly reduces encryption process's - Ensuring a respectable degree of encryption


execution time and power consumption compared process complexity might be challenging.
[7] Lightweight to AES.
Encryption Technique for - Further testing may be needed to validate
Voice Comm - Suitable for wireless environments. security claims.

- Complexity involved in the selection and


- Enhanced resistance against differential derivation of S-boxes.
electromagnetic and energy analysis.
[8] Alternative - Ongoing concerns about hardware security
Approach to Generate S- - Notable security enhancements for certain challenges, particularly in microprocessor-based
boxes microprocessor-based security tokens. tokens.

- Potential increase in implementation


- Resistance against differential overhead.
electromagnetic and energy analysis.
- Ongoing concerns about hardware security
[9] Novel Approach for - Notable security enhancements for challenges, particularly in microprocessor-based
Implementing AES microprocessor-based security tokens. tokens.

- Innovative hybrid system producing


condensed results in memory space and gate
equivalents. - Potential challenges in ensuring robustness
[15] Lightweight and security against various attacks.
Encryption System Using - Beneficial for embedded security
GRP applications. - Implementation complexity might increase.

- Lack of awareness regarding potential


attacks on 7 rounds, highlighting a gap in
- Notable reduction in execution time. security and cryptanalysis understanding.
[11] 5-round AES
Encryption Algorithm for - Security analysis indicating robust - Further validation needed to ensure the
WSNs encryption strength and randomness. claimed security and performance benefits.

33
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

IV. SUMMARY To critically analyze this paper, we can break it down into
several components:
In summary, wireless networks constitute a critical
component of the (IoT), and ensuring their security is The paper begins by acknowledging prior research efforts in
paramount. Encryption serves as the cornerstone of security by addressing security concerns in real-time traffic. It highlights
safeguarding the confidentiality of information, with the AES the development of algorithms aimed at mitigating delays. It
algorithm recognized as the premier choice due to its then introduces the main focus of the paper, which is the
robustness. exploration of lightweight cryptographic protocols tailored for
However, further research is necessary to optimize this IoT networks. The paper conducts a comparative assessment
algorithm to fulfill the (QoS) demands of emerging wireless of modern ciphers, categorizing them into symmetric and
devices, considering factors such as their energy efficiency asymmetric lightweight cryptography. The paper provides a
and the timely transmission (delay) of voice trafficReal-time historical context for the development of lightweight
applications and voice hold immense significance in wireless cryptography, mentioning its initiation in Europe in 2004 and
networks due to the substantial volume of traffic these its revival through the M2M/IoT process. It notes the creation
applications are expected to generate within the context of the of international standards and the involvement of
(IoT). organizations like ISO/IEC JTC 1/SC 27 and NIST. The paper
Ensuring the security and maintaining the quality of these references various other studies and contributions in the field
applications poses a significant challenge. Numerous studies, of lightweight cryptography, including the introduction of new
including those by [12], [13], and [8], have been conducted to algorithms for generating S-Boxes, low-power encryption
tackle these issues. Nevertheless, there are still gaps in their schemes for IoT devices, and innovative approaches to
research efforts. Unfortunately, certain researchers, such as enhance existing algorithms like AES. Several studies
[14] and [4], have primarily concentrated on addressing mentioned in the paper aim to enhance the security of
security issues by increasing the complexity of encryption cryptographic algorithms against different types of attacks,
algorithms to enhance resistance against cryptanalysis. such as power analysis attacks, electromagnetic analysis, and
However, they have not adequately considered the (QoS) differential analysis. Alongside security enhancements, there's
requirements and limitations of nodes. Consequently, their a focus on performance considerations, such as
approaches are not suitable for wireless devices due to the encryption/decryption time, energy consumption, memory
sensitive demands of wireless networks, including factors such usage, and execution efficiency, particularly important for
as delays, throughput, and power consumption. Although the resource-constrained devices like IoT devices. Each proposed
studies conducted by [15] and [11] have tackled (QoS) solution or algorithm is evaluated based on its effectiveness in
metrics, there are significant apprehensions regarding the addressing security concerns, meeting performance
security robustness of their work. An ideal algorithm requirements, and suitability for specific applications or
specification for wireless environments should strike a balance environments. The paper also reflects on ongoing challenges
between being lightweight and secure. My proposed approach and unanswered questions in the field, such as hardware
involves modifying certain functions within this algorithm, security concerns, the complexity of implementation, and the
rendering it lightweight and appropriate for Voice over Mobile need for meticulous attention to detail.
Ad-hoc Networks (V-over-IoT), thereby achieving a favorable
balance between security and (QoS) metrics. Future efforts
may resolve the issues pertaining to voice delay, device power
V. CONCLUSION
limitations, and algorithm security levels, as previous attempts
have not concurrently addressed these challenges. Suitable In conclusion, the paper provides a comprehensive
tade-off will enhance IoT security and performance. overview of the ongoing research and development efforts in
the field of lightweight cryptography, particularly in the
context of addressing security concerns in real-time traffic and

34
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

IoT networks. Through a historical narrative, it highlights the Supports Digital Businesses /www.nec.com/ .
evolution of lightweight cryptography from its inception in [6] M.A.F. Al-Husainy, B. Al-Shargabi, S. Aljawarneh “Lightweight
cryptography system for IoT devices using DNA” Comput. Electr. Eng.,
Europe to its contemporary resurgence, involving international 95 (2021)
standardization bodies and prominent research institutions like [7] F. Hazzaa, S. Yousef, E. Sanchez and M. Cirstea, "Lightweight and
NIST. Low-Energy Encryption Scheme for Voice over Wireless Devices,"
IECON 2018 - 44th Annual Conference of the IEEE Industrial
The paper illustrates the multifaceted approach taken by Electronics Society, Washington, DC, 2018
researchers, encompassing the exploration of advanced [8] Lambić , D. & Živković, M., 2013. COMPARISON OF RANDOM S-
BOX GENERATION METHODS. PUBLICATIONS DE L’INSTITUT
cryptographic protocols, comparative assessments of modern MATHÉMATIQUE, Ministry of Science and Technology of Serbia,
ciphers, and innovative solutions to enhance the security and 93(107), p. 109–115.
performance of cryptographic algorithms. It underscores the [9] Masoumi, M., Rezayati, M.H. and Shi, W., 2015. An experimental
setup for practical differential electromagnetic and power analysis of
importance of considering not only the cryptographic strength AES cryptosystem. International Journal of Internet Technology and
but also the practical constraints such as execution time, energy Secured Transactions, 6(1), pp.9-24.
consumption, and memory usage, especially in resource- [10] Tukur Y.M., Ali Y.S. Demonstrating the effect of insider attacks on
perception layer of internet of things (IoT) systems 15th International
constrained environments like IoT devices. Conference on Electronics, Computer and Computation
(ICECCO), IEEE (2019).
Furthermore, the paper reflects on the ongoing challenges
[11] Msolli, A., Helali , A. & Maaref, H., July 2016. Image encryption with
and unanswered questions in the field, emphasizing the need the AES algorithm in wireless sensor network. Tunisia, IEEE - 2nd
for continued research and development to address emerging International Conference on Advanced Technologies for Signal and
Image Processing (ATSIP).
security threats and to overcome the inherent complexities of
[12] D. Salama and M. Hadhoud, "Evaluating the effect of symmetric
cryptographic systems. It calls for a balanced approach that Algorithms on Power consumption for Different Data types,"
combines theoretical advancements with practical International Journal of Network Security, vol. 11, no. 2, pp. 78-87,
2010.
considerations to ensure the effectiveness and applicability of
[13] Amine, M., Maglaras, L. & Argy, A., Security for 4G and 5G cellular
cryptographic solutions in real-world scenarios. networks: A survey of existing authentication and privacy-preserving
schemes. Elsevier-Journal of Network and Computer Applications,
Overall, the paper provides valuable insights into the Volume 101, 2018.
current state of lightweight cryptography research, highlighting [14] A. Khan, Q. T. Sun, Z. Mahmood and A. Ghafoor, "Energy Efficient
Partial Permutation Encryption on Network Coded MANETs," Journal
both progress made and areas for further exploration. It serves of Electrical and Computer Engineering, pp. 1-10, 2017.
as a testament to the collaborative efforts of researchers [15] Bansod, G., Raval, N. & Pisharo, N., 2015. Implementation of a New
worldwide in advancing cryptographic technologies to meet the Lightweight Encryption Design for Embedded Security. IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
evolving security needs of modern digital ecosystems. 10(1), pp. 142-151.

REFERENCES
[16] P. Zhang and C. Lin, "A Lightweight Encryption Scheme for Network-
Coded Mobile Ad Hoc Networks," IEEE Transactions on Parallel and
Distributed Systems, vol. 25, no. 9, pp. 2211 - 2221, 2014.
[1] Muhammad Rana, Quazi Mamun, Rafiqul Islam, Lightweight
cryptography in IoT networks: A survey,Future Generation Computer [17] Panwara, N., Sharmaa, S. & Singh, A. K., 2016. A survey on 5G: The
Systems,Volume 129,2022 next generation of mobile communication. Physical Communication-
Elsevier. [Since Direct.online]: www.sciencedirect.com/science/article,
[2] Khattak H.A., Shah M.A., Khan S., Ali I., Perception layer security in
12(2), pp. 64-84.
Internet of Things Future Gener. Comput. Syst., 100 (2019)
[18] Ayyappadas, Devassy, S. George and A. Devassy, "Survey of
[3] Osama A. Khashan, Rami Ahmad, Nour M. Khafajah,An automated Symmetric Cryptographic Algorithms," Journal of Electronics and
lightweight encryption scheme for secure and energy-efficient
Communication Engineering (IOSR-JECE), pp. 65-75, 2014.
communication in wireless sensor networks,Ad Hoc Networks,Volume
115, 2021. [19] s. Cheng, P. Chen and C. Lin, "Traffic-Aware Patching for Cyber
Security in Mobile IoT," IEEE Communications Magazine, vol. 55, no.
[4] Das , I., Nath , S., Roy , S. & Mondal, S., 2013. Random S-Box 7, pp. 29 - 35, 2017.
generation in AES by changing irreducible polynomial. India,
International Conference on Communications, Devices and Intelligent [20] w. Hu and Cao, "Quality-Aware Traffic Offloading in Wireless
Systems (CODIS). Networks," IEEE TRANSACTIONS ON MOBILE COMPUTING, vol.
16, no. 11, March 2017.
[5] OKAMURA Toshihiko, Lightweight Cryptography Applicable to
Various IoT Devices, Vol.12 (2017) No. 1 Special Issue on IoT That

35
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 14, Issue 01, March 2024

[21] Samad , S. K., Mudaliar, K. & Zhang, C., July 2017. Impact of IPSec
security on VoIP in different environments. Milan, Italy, IEEE-Ninth
International Conference on Ubiquitous and Future Networks (ICUFN)
[22] F. Hazzaa, S. Yousef, N. H. Ali and E. Sanchez, "The Effect of Nodes
Density on Real Time Traffic in Mobile Ad Hoc Network," 2019 IEEE
12th International Conference on Global Security, Safety and
Sustainability (ICGS3),pp. 209-212, London, United Kingdom, 2019.
[23] Basaras , P., Belikaidis, I. & Maglaras, L., 2016. Blocking epidemic
propagation in vehicular networks. Italy, 12th Annual Conference on
Wireless On-demand Network Systems and Services (WONS).

36

You might also like