Skip to main content

2022 | OriginalPaper | Buchkapitel

4. Lightweight Cryptographic Techniques and Protocols for IoT

verfasst von : Shubham Gupta, Sandeep Saxena

Erschienen in: Internet of Things

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of things (IoT) is a developing and emerging technology for bridging the gap between the physical and cyberspace. IoT furnishes various services in massive applications such as agriculture, transportation, gaming, cities, health, and the industrial environment. Researchers and academicians have proposed various lightweight cryptographic techniques and protocols for low-power IoT-enabled devices. Despite hundreds of conveniences and advantages of IoT technology, the IoT-enabled lightweight schemes suffer from several security threats due to malicious attacks, lack of privacy preservation and key secrecy, huge storage and computation overhead. This chapter focuses on various international standards bodies that empower the rapid growth of IoT-enabled protocol development. These standard bodies include network, communication, access, and application layer protocols that provide vision into the existing research to resolve the security challenges. Also, this chapter discusses the different protocol stacks for implementing early IoT advancements for millions of already installed wireless nodes. Moreover, very constrained research is available in the existing literature that meets the characteristics and specifications of IoT protocol development. In this chapter, we study the communication characteristics of IoT protocols with their features thoroughly. Finally, we illustrate the state-of-the-art IoT-enabled cryptographic schemes and demonstrate a detailed analysis of the previous protocols. Most of the protocols are classified into two categories such as private- and public-key-based lightweight cryptography. Furthermore, we discuss numerous research challenges and open problems of IoT-enabled lightweight cryptographic protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abhishek K, Sanmeet K (2020) Internet of things (iot), applications and challenges: a comprehensive review. Wireless Personal Commun 114:1687–1762CrossRef Abhishek K, Sanmeet K (2020) Internet of things (iot), applications and challenges: a comprehensive review. Wireless Personal Commun 114:1687–1762CrossRef
Zurück zum Zitat Adriano JD, Carlos do Rosario E, Rodrigues JJPC (2018) Wireless sensor networks in industry 4.0: Wirelesshart and isa100. 11a. In: 2018 13th IEEE International conference on industry applications (INDUSCON), pp 924–929. IEEE Adriano JD, Carlos do Rosario E, Rodrigues JJPC (2018) Wireless sensor networks in industry 4.0: Wirelesshart and isa100. 11a. In: 2018 13th IEEE International conference on industry applications (INDUSCON), pp 924–929. IEEE
Zurück zum Zitat Afzal B, Umair M, Asadullah Shah G, Ahmed E (2019) Enabling iot platforms for social iot applications: vision, feature mapping, and challenges. Fut Gener Comput Syst 92:718–731CrossRef Afzal B, Umair M, Asadullah Shah G, Ahmed E (2019) Enabling iot platforms for social iot applications: vision, feature mapping, and challenges. Fut Gener Comput Syst 92:718–731CrossRef
Zurück zum Zitat Baskar C, Balasubramaniyan C, Manivannan D (2016) Establishment of light weight cryptography for resource constraint environment using fpga. Procedia Comput Sci 78:165–171CrossRef Baskar C, Balasubramaniyan C, Manivannan D (2016) Establishment of light weight cryptography for resource constraint environment using fpga. Procedia Comput Sci 78:165–171CrossRef
Zurück zum Zitat Bhale P, Biswas S, Nandi S (2021) Liene: lifetime enhancement for 6lowpan network using clustering approach use case: smart agriculture Bhale P, Biswas S, Nandi S (2021) Liene: lifetime enhancement for 6lowpan network using clustering approach use case: smart agriculture
Zurück zum Zitat Blundo C, Cresti A (1994) Space requirements for broadcast encryption. In: Workshop on the theory and application of of cryptographic techniques, pp 287–298. Springer Blundo C, Cresti A (1994) Space requirements for broadcast encryption. In: Workshop on the theory and application of of cryptographic techniques, pp 287–298. Springer
Zurück zum Zitat Canteaut A, Carpov S, Fontaine C, Fournier J, Lac B, Naya-Plasencia M, Sirdey R, Tria A (2017) End-to-end data security for iot: from a cloud of encryptions to encryption in the cloud. In: Cesar Conference Canteaut A, Carpov S, Fontaine C, Fournier J, Lac B, Naya-Plasencia M, Sirdey R, Tria A (2017) End-to-end data security for iot: from a cloud of encryptions to encryption in the cloud. In: Cesar Conference
Zurück zum Zitat Chaitanya Kumar N, Basit A, Singh P, Venkaiah VC (2018) Lightweight cryptography for distributed pki based manets. arXiv e-prints, arXiv–1804 Chaitanya Kumar N, Basit A, Singh P, Venkaiah VC (2018) Lightweight cryptography for distributed pki based manets. arXiv e-prints, arXiv–1804
Zurück zum Zitat Cline G (2017) Product development in the era of iot: tying the digital thread. In: Aberdeen Group Cline G (2017) Product development in the era of iot: tying the digital thread. In: Aberdeen Group
Zurück zum Zitat Coppolino L, DAntonio S, Mazzeo G, Romano L, (2017) Emerging threats and current solutions. Cloud security. Comput Electr Eng 59:126–140 Coppolino L, DAntonio S, Mazzeo G, Romano L, (2017) Emerging threats and current solutions. Cloud security. Comput Electr Eng 59:126–140
Zurück zum Zitat Coppolino L, D’Antonio S, Mazzeo G, Romano L (2019) A comprehensive survey of hardware-assisted security: from the edge to the cloud. Internet of Things 6:100055CrossRef Coppolino L, D’Antonio S, Mazzeo G, Romano L (2019) A comprehensive survey of hardware-assisted security: from the edge to the cloud. Internet of Things 6:100055CrossRef
Zurück zum Zitat Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Future Gener Comput Syst 89:110–125CrossRef Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Future Gener Comput Syst 89:110–125CrossRef
Zurück zum Zitat Datta P, Sharma B (2017) A survey on iot architectures, protocols, security and smart city based applications. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT), pp 1–5. IEEE Datta P, Sharma B (2017) A survey on iot architectures, protocols, security and smart city based applications. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT), pp 1–5. IEEE
Zurück zum Zitat Deloitte (2021) Internet of things (iot): the rise of the connected world, pp 1–34 Deloitte (2021) Internet of things (iot): the rise of the connected world, pp 1–34
Zurück zum Zitat Dingding J, Yamin L, Bao L (2020) Ibe with tight security against selective opening and chosen-ciphertext attacks. Designs Codes Cryptogr 88(7):1371–1400MathSciNetCrossRef Dingding J, Yamin L, Bao L (2020) Ibe with tight security against selective opening and chosen-ciphertext attacks. Designs Codes Cryptogr 88(7):1371–1400MathSciNetCrossRef
Zurück zum Zitat Diniesh VC, Murugesan G, Joseph Auxilius Jude M, Harshini A, Bhavataarani S, Gokul Krishnan R (2021) Impacts of objective function on rpl-routing protocol: a survey. In: 2021 Sixth international conference on wireless communications, signal processing and networking (WiSPNET), pp 251–255. IEEE Diniesh VC, Murugesan G, Joseph Auxilius Jude M, Harshini A, Bhavataarani S, Gokul Krishnan R (2021) Impacts of objective function on rpl-routing protocol: a survey. In: 2021 Sixth international conference on wireless communications, signal processing and networking (WiSPNET), pp 251–255. IEEE
Zurück zum Zitat Don J, Alfred M, Scott V (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63CrossRef Don J, Alfred M, Scott V (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63CrossRef
Zurück zum Zitat Ensworth JF, Reynolds MS (2017) Ble-backscatter: ultralow-power iot nodes compatible with bluetooth 4.0 low energy (ble) smartphones and tablets. IEEE Trans Microwave Theory Techniques 65(9):3360–3368 Ensworth JF, Reynolds MS (2017) Ble-backscatter: ultralow-power iot nodes compatible with bluetooth 4.0 low energy (ble) smartphones and tablets. IEEE Trans Microwave Theory Techniques 65(9):3360–3368
Zurück zum Zitat Ghada G, Aref M (2019) 6lowpsec: an end-to-end security protocol for 6lowpan. Ad Hoc Networks 82:100–112CrossRef Ghada G, Aref M (2019) 6lowpsec: an end-to-end security protocol for 6lowpan. Ad Hoc Networks 82:100–112CrossRef
Zurück zum Zitat Gupta M, Singh S (2020) A survey on the zigbee protocol, it’s security in internet of things (iot) and comparison of zigbee with bluetooth and wi-fi. In: Applications of artificial intelligence in engineering: proceedings of first global conference on artificial intelligence and applications (GCAIA 2020), p 473. Springer Gupta M, Singh S (2020) A survey on the zigbee protocol, it’s security in internet of things (iot) and comparison of zigbee with bluetooth and wi-fi. In: Applications of artificial intelligence in engineering: proceedings of first global conference on artificial intelligence and applications (GCAIA 2020), p 473. Springer
Zurück zum Zitat Hannes T, Emmanuel B (2019) Cyberphysical security for the masses: a survey of the internet protocol suite for internet of things security. IEEE Secur Privacy 17(5):47–57CrossRef Hannes T, Emmanuel B (2019) Cyberphysical security for the masses: a survey of the internet protocol suite for internet of things security. IEEE Secur Privacy 17(5):47–57CrossRef
Zurück zum Zitat Jacobovitz O (2016) Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Jacobovitz O (2016) Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva
Zurück zum Zitat Jetmir H, Eli DP, Ingrid M, Jeroen H (2018) A survey of lorawan for iot: from technology to application. Sensors 18(11):3995CrossRef Jetmir H, Eli DP, Ingrid M, Jeroen H (2018) A survey of lorawan for iot: from technology to application. Sensors 18(11):3995CrossRef
Zurück zum Zitat Kalyani G, Chaudhari S (2020) Survey on 6lowpan security protocols in iot communication. In: ICDSMLA 2019, pp 696–702. Springer Kalyani G, Chaudhari S (2020) Survey on 6lowpan security protocols in iot communication. In: ICDSMLA 2019, pp 696–702. Springer
Zurück zum Zitat Kanakaris V, Papakostas GA (2020) Internet of things protocols-a survey. Int J Human Technol 1(2):101–117CrossRef Kanakaris V, Papakostas GA (2020) Internet of things protocols-a survey. Int J Human Technol 1(2):101–117CrossRef
Zurück zum Zitat Karalis A, Zorbas D, Douligeris C (2018) Collision-free broadcast methods for IEEE 802.15, 4-tsch networks formation, pp 91–98 Karalis A, Zorbas D, Douligeris C (2018) Collision-free broadcast methods for IEEE 802.15, 4-tsch networks formation, pp 91–98
Zurück zum Zitat Khusanbek G, Tai-Myoung C (2019) Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J Inf Proces Syst 15(4):797–819 Khusanbek G, Tai-Myoung C (2019) Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J Inf Proces Syst 15(4):797–819
Zurück zum Zitat Kim H-S, Ko J, Culler DE, Paek J (2017) Challenging the ipv6 routing protocol for low-power and lossy networks (rpl): a survey. IEEE Commun Surv Tutor 19(4):2502–2525CrossRef Kim H-S, Ko J, Culler DE, Paek J (2017) Challenging the ipv6 routing protocol for low-power and lossy networks (rpl): a survey. IEEE Commun Surv Tutor 19(4):2502–2525CrossRef
Zurück zum Zitat Kinza Shafique, Bilal A Khawaja, Farah Sabir, Sameer Qazi, and Muhammad Mustaqim. Internet of things (iot) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5g-iot scenarios. IEEE Access, 8:23022–23040, 2020 Kinza Shafique, Bilal A Khawaja, Farah Sabir, Sameer Qazi, and Muhammad Mustaqim. Internet of things (iot) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5g-iot scenarios. IEEE Access, 8:23022–23040, 2020
Zurück zum Zitat Krejčí R, Hujňák O, Švepeš M (2017) Security survey of the iot wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR), pp 1–4. IEEE Krejčí R, Hujňák O, Švepeš M (2017) Security survey of the iot wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR), pp 1–4. IEEE
Zurück zum Zitat Lihua L, Shangping W, Bintao H, Duo Z (2019) A keyword-searchable ABE scheme from lattice in cloud storage environment. IEEE 7 Access 109038–109053 Lihua L, Shangping W, Bintao H, Duo Z (2019) A keyword-searchable ABE scheme from lattice in cloud storage environment. IEEE 7 Access 109038–109053
Zurück zum Zitat Limei He, Zheng Yan, Mohammed Atiquzzaman (2018) Lte/lte-a network security data collection and analysis for security measurement: A survey. IEEE Access 6:4220–4242CrossRef Limei He, Zheng Yan, Mohammed Atiquzzaman (2018) Lte/lte-a network security data collection and analysis for security measurement: A survey. IEEE Access 6:4220–4242CrossRef
Zurück zum Zitat Marco L, Francesco P, Domenico S (2021) Internet of things: a general overview between architectures, protocols and applications. Information 12(2):87CrossRef Marco L, Francesco P, Domenico S (2021) Internet of things: a general overview between architectures, protocols and applications. Information 12(2):87CrossRef
Zurück zum Zitat Marksteiner S, Juan Expósito Jiménez V, Valiant H, Zeiner H (2017) An overview of wireless iot protocol security in the smart home domain. In: 2017 Internet of Things business models, users, and networks, pp 1–8. IEEE Marksteiner S, Juan Expósito Jiménez V, Valiant H, Zeiner H (2017) An overview of wireless iot protocol security in the smart home domain. In: 2017 Internet of Things business models, users, and networks, pp 1–8. IEEE
Zurück zum Zitat Mavromatis A, Colman-Meixner C, Silva AP, Vasilakos X, Nejabati R, Simeonidou D (2019) A software-defined iot device management framework for edge and cloud computing. IEEE Internet of Things J 7(3):1718–1735CrossRef Mavromatis A, Colman-Meixner C, Silva AP, Vasilakos X, Nejabati R, Simeonidou D (2019) A software-defined iot device management framework for edge and cloud computing. IEEE Internet of Things J 7(3):1718–1735CrossRef
Zurück zum Zitat Naidu GA, Kumar J (2019) Wireless protocols: Wi-fi son, bluetooth, zigbee, z-wave, and wi-fi. In: Innovations in electronics and communication engineering, pp 229–239. Springer Naidu GA, Kumar J (2019) Wireless protocols: Wi-fi son, bluetooth, zigbee, z-wave, and wi-fi. In: Innovations in electronics and communication engineering, pp 229–239. Springer
Zurück zum Zitat Nastase L (2017) Security in the internet of things: a survey on application layer protocols. In: 2017 21st international conference on control systems and computer science (CSCS), pp 659–666. IEEE Nastase L (2017) Security in the internet of things: a survey on application layer protocols. In: 2017 21st international conference on control systems and computer science (CSCS), pp 659–666. IEEE
Zurück zum Zitat Rajashree S, Soman KS, Gajkumar Shah P (2018) Security with ip address assignment and spoofing for smart iot devices. In: 2018 international conference on advances in computing, communications and informatics (ICACCI), pp 1914–1918. IEEE Rajashree S, Soman KS, Gajkumar Shah P (2018) Security with ip address assignment and spoofing for smart iot devices. In: 2018 international conference on advances in computing, communications and informatics (ICACCI), pp 1914–1918. IEEE
Zurück zum Zitat Raposo D, Rodrigues A, Sinche S, Silva JS, Boavida F (2018) Securing wirelesshart: monitoring, exploring and detecting new vulnerabilities. In: 2018 IEEE 17th International symposium on network computing and applications (NCA), pp 1–9. IEEE Raposo D, Rodrigues A, Sinche S, Silva JS, Boavida F (2018) Securing wirelesshart: monitoring, exploring and detecting new vulnerabilities. In: 2018 IEEE 17th International symposium on network computing and applications (NCA), pp 1–9. IEEE
Zurück zum Zitat Savvidina Auliva R, Sheu RK, Liang D, Wang W-J (2018) Iiot testbed: a dds-based emulation tool for industrial iot applications. In: 2018 International conference on system science and engineering (ICSSE), pp 1–4. IEEE Savvidina Auliva R, Sheu RK, Liang D, Wang W-J (2018) Iiot testbed: a dds-based emulation tool for industrial iot applications. In: 2018 International conference on system science and engineering (ICSSE), pp 1–4. IEEE
Zurück zum Zitat Sharma P, Kherajani M, Jain D, Patel D (2020) A study of routing protocols, security issues and attacks in network layer of internet of things framework. In: 2nd International conference on data, engineering and applications (IDEA), pp 1–6. IEEE Sharma P, Kherajani M, Jain D, Patel D (2020) A study of routing protocols, security issues and attacks in network layer of internet of things framework. In: 2nd International conference on data, engineering and applications (IDEA), pp 1–6. IEEE
Zurück zum Zitat Soni D, Makwana A (2017) A survey on mqtt: a protocol of internet of things (IoT). In: International conference on telecommunication, power analysis and computing techniques (ICTPACT-2017), vol 20 Soni D, Makwana A (2017) A survey on mqtt: a protocol of internet of things (IoT). In: International conference on telecommunication, power analysis and computing techniques (ICTPACT-2017), vol 20
Zurück zum Zitat Sowmya KV, Teju V, Pavan Kumar T (2021) An extensive survey on iot protocols and applications. In: International Conference on Intelligent and Smart Computing in Data Analytics, vol 1312, 131 Sowmya KV, Teju V, Pavan Kumar T (2021) An extensive survey on iot protocols and applications. In: International Conference on Intelligent and Smart Computing in Data Analytics, vol 1312, 131
Zurück zum Zitat Terán M, Aranda J, Carrillo H, Mendez D, Parra C (2017) Iot-based system for indoor location using bluetooth low energy. In: 2017 IEEE Colombian conference on communications and computing (COLCOM), pp 1–6. IEEE Terán M, Aranda J, Carrillo H, Mendez D, Parra C (2017) Iot-based system for indoor location using bluetooth low energy. In: 2017 IEEE Colombian conference on communications and computing (COLCOM), pp 1–6. IEEE
Zurück zum Zitat Urien P (2017) Introducing tls/dtls secure access modules for iot frameworks: concepts and experiments. In: 2017 IEEE symposium on computers and communications (ISCC), pp 220–227. IEEE Urien P (2017) Introducing tls/dtls secure access modules for iot frameworks: concepts and experiments. In: 2017 IEEE symposium on computers and communications (ISCC), pp 220–227. IEEE
Zurück zum Zitat Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J-P, Alexander RK et al (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. RFC 6550:1–157 Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J-P, Alexander RK et al (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. RFC 6550:1–157
Zurück zum Zitat Xuanxia Y, Zhi C, Ye T (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef Xuanxia Y, Zhi C, Ye T (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef
Zurück zum Zitat Yang Y, Xianghan Z, Chunming T (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37CrossRef Yang Y, Xianghan Z, Chunming T (2017) Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl 89:26–37CrossRef
Zurück zum Zitat Zhang P (2018) A survey on the security of coap and xmpp and their performance comparison Zhang P (2018) A survey on the security of coap and xmpp and their performance comparison
Zurück zum Zitat Zhang Y, Weng J, Dey R, Jin Y, Lin Z, Fu X (2020) Breaking secure pairing of bluetooth low energy using downgrade attacks. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp 37–54 Zhang Y, Weng J, Dey R, Jin Y, Lin Z, Fu X (2020) Breaking secure pairing of bluetooth low energy using downgrade attacks. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp 37–54
Metadaten
Titel
Lightweight Cryptographic Techniques and Protocols for IoT
verfasst von
Shubham Gupta
Sandeep Saxena
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1585-7_4

Neuer Inhalt