A Review of Data Security and Cryptographic Techniques in IoT based devices

被引:14
|
作者
Mustafa, Ghulam [1 ]
Ashraf, Rehan [1 ]
Mirza, Muhammad Ayzed [1 ]
Jamil, Abid [1 ]
Muhammad [1 ]
机构
[1] Natl Text Univ, Dept Comp Sci, Faisalabad, Pakistan
关键词
Lightweight; Security; IoT; Cryptography; Stenography; Encryption; Decryption; Ciphers; Big Data; INTERNET;
D O I
10.1145/3231053.3231100
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The idea of the Internet of Things (IoT) is to connect or give access to everything to the Internet. IoT environment not only provides the facility of Human to Machine connectivity, however, it also creates Machine to Machine connectivity. As everything is going to connect to the Internet and also generating the data. So, the data generating by these devices is growing up rapidly, that huge amount of data is called Big Data. This data has huge Volume, High Velocity, and different Variety. The security of this data is a risk. As we know that, the IoT devices have constraints like low power and less computational speed and the traditional encryption algorithms like DES, 3DES, and AES are more complex. Traditional encryption algorithm seems not feasible for IoT devices. So, we need to develop Lightweight encryption algorithm for IoT devices for secure communication and secure data transmission in IoT environment. Cryptography and Steganography techniques are used for securing the data over the Internet. Cryptography encrypts the data by using a key and make a ciphertext that cannot be readable by the normal user. Steganography hides the data by concealing it into another medium like data, image, audio, video, or mixed. This paper provides a review of important lightweight cryptographic techniques used for IoT devices.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Non-Cryptographic Security to Data: Distortion based Anonymization Techniques
    Banu, K. Sharmila
    Santhi, V.
    Tripathy, B. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,
  • [2] Evaluation of Security Techniques in Heterogeneous IoT Devices
    Mosca, Eduardo
    Ribeiro, Silvio
    Urbano, Arthur
    Silva, Danielle S.
    Gomes, Rafael L.
    [J]. PROCEEDINGS OF 2022 11TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, LADC 2022, 2022, : 91 - 94
  • [3] IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
    Xiao, Liang
    Wan, Xiaoyue
    Lu, Xiaozhen
    Zhang, Yanyong
    Wu, Di
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) : 41 - 49
  • [4] SECURITY OF IOT DEVICES BASED ON LTE
    Zidkova, Nikola
    Maryska, Milos
    [J]. DIGITALIZED ECONOMY, SOCIETY AND INFORMATION MANAGEMENT (IDIMT-2020), 2020, 49 : 325 - 332
  • [5] A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices
    Qaid, Gamil R. S.
    Ebrahim, Nadhem Sultan
    [J]. Security and Communication Networks, 2023, 2023
  • [6] Analysis of cryptographic encryption algorithm design to Secure IoT Devices: A review
    Garg, Piyush
    Singh, Dileep Kumar
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 810 - 814
  • [7] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    [J]. SENSORS, 2024, 24 (12)
  • [8] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    [J]. IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [9] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
  • [10] Soft Computing Techniques for Physical Layer Security of IoT Devices
    Siyad, C. Ismayil
    Tamilselvan, S.
    [J]. Studies in Big Data, 2021, 89 : 27 - 51