Skip to main content

2024 | OriginalPaper | Buchkapitel

Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher

verfasst von : Van Nam Ngo, Anh Ngoc Le, Do-Hyeun Kim

Erschienen in: Parallel and Distributed Computing, Applications and Technologies

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) stands out as one of the most remarkable innovations in recent times, offering a promising future for global connectivity. However, the rapid expansion of IoT ecosystems has led to a significant increase in the attack surface, posing risks to platforms, computing systems, multifunction protocols, and network access ubiquity. To mitigate these risks, it is crucial to adopt secure system design and development practices. Popular security solutions such as data encryption and authentication have been widely employed in IoT systems. Nonetheless, the unique constraints of IoT platforms present challenges in selecting suitable algorithms. In this paper, we provide an overview and analysis of the security challenges in IoT along with potential solutions. Additionally, we propose a testing methodology for the PRESENT-32bit cipher, based on an analysis of prevalent lightweight cryptography techniques. Our implementation results demonstrate the advantages of this approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Constantinos, K., Georgios, K., Angelos, S., Jeffrey, V.: DDoS in the IoT: mirai and other botnets. Computer 50, 80–84 (2017)CrossRef Constantinos, K., Georgios, K., Angelos, S., Jeffrey, V.: DDoS in the IoT: mirai and other botnets. Computer 50, 80–84 (2017)CrossRef
2.
Zurück zum Zitat Collins, S., McCombie, S.: Stuxnet: the emergence of a new cyber weapon and its implications. J. Policing, Intell. Counter Terror. 7, 80–91 (2012) Collins, S., McCombie, S.: Stuxnet: the emergence of a new cyber weapon and its implications. J. Policing, Intell. Counter Terror. 7, 80–91 (2012)
3.
Zurück zum Zitat Ray, P.: A survey on internet of things architectures. J. King Saud Univ. – Comput. Inform. Sci. 30, 291–319 (2018) Ray, P.: A survey on internet of things architectures. J. King Saud Univ. – Comput. Inform. Sci. 30, 291–319 (2018)
4.
Zurück zum Zitat Rana, M., Mamun, Q., Islam, R.: Lightweight cryptography in IoT networks: a survey. Futur. Gener. Comput. Syst. 129, 77–89 (2022)CrossRef Rana, M., Mamun, Q., Islam, R.: Lightweight cryptography in IoT networks: a survey. Futur. Gener. Comput. Syst. 129, 77–89 (2022)CrossRef
5.
Zurück zum Zitat Bogdanov, A., et al.: L.N.IC. Science, Ed. Berlin, Heidelberg, Springer 2007, 450–466 (2007) Bogdanov, A., et al.: L.N.IC. Science, Ed. Berlin, Heidelberg, Springer 2007, 450–466 (2007)
6.
Zurück zum Zitat Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference (2015) Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference (2015)
7.
Zurück zum Zitat Housley, R.: Using AES-CCM and AES-CGM authenticated encryption in the cryptographic message syntax(CMS). RFC Editor 5084, 11 (2007) Housley, R.: Using AES-CCM and AES-CGM authenticated encryption in the cryptographic message syntax(CMS). RFC Editor 5084, 11 (2007)
8.
Zurück zum Zitat Hellman, M.E.: A cryptanalytic time–memory trade-off. IEEE Trans. Inform. Theor. 26(4), 401–406 (1980) Hellman, M.E.: A cryptanalytic time–memory trade-off. IEEE Trans. Inform. Theor. 26(4), 401–406 (1980)
9.
Zurück zum Zitat Tedjini, S., Andia-Vera, G., Zurita, M., Freire, R., Duroc, Y.: Augmented RFID Tags. In: 2016 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet) (2016) Tedjini, S., Andia-Vera, G., Zurita, M., Freire, R., Duroc, Y.: Augmented RFID Tags. In: 2016 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet) (2016)
10.
Zurück zum Zitat Hahnel, D., Burgard, W., Fox, D., Fishkin, K., Philipose, M.: Mapping and localization with RFID technology. In: IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA ‘04. 2004 (2004) Hahnel, D., Burgard, W., Fox, D., Fishkin, K., Philipose, M.: Mapping and localization with RFID technology. In: IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA ‘04. 2004 (2004)
11.
Zurück zum Zitat Sim, B.-Y., Han, D.-G.: A study on the side-channel analysis trends for application to IoT devices (2020) Sim, B.-Y., Han, D.-G.: A study on the side-channel analysis trends for application to IoT devices (2020)
12.
Zurück zum Zitat Li, P., Sun, L., Xiangyan, F., Lin, N.: Security in Wireless Sensor Networks,” in Wireless Network Security: Theories and Applications, pp. 179–227. Heidelberg, Springer, Berlin Heidelberg, Berlin (2013) Li, P., Sun, L., Xiangyan, F., Lin, N.: Security in Wireless Sensor Networks,” in Wireless Network Security: Theories and Applications, pp. 179–227. Heidelberg, Springer, Berlin Heidelberg, Berlin (2013)
13.
Zurück zum Zitat Venugopalan, V., Patterson, C.D.: Surveying the hardware trojan threat landscape for the internet-of-things. J. Hardw. Syst. Secur. 2(2), 131–141 (2018)CrossRef Venugopalan, V., Patterson, C.D.: Surveying the hardware trojan threat landscape for the internet-of-things. J. Hardw. Syst. Secur. 2(2), 131–141 (2018)CrossRef
14.
Zurück zum Zitat Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware Trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (2009) Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware Trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (2009)
15.
Zurück zum Zitat Danev, B., Luecken, H., Capkun, S., El Defrawy, K.: Attacks on physical-layer identification. In: WiSec ‘10: Proceedings of the Third ACM Conference on Wireless network security (2010) Danev, B., Luecken, H., Capkun, S., El Defrawy, K.: Attacks on physical-layer identification. In: WiSec ‘10: Proceedings of the Third ACM Conference on Wireless network security (2010)
16.
Zurück zum Zitat Aras, E., Small, N., Ramachandran, G.S., St\'{e}phane, D., Joosen, W., Hughes, D.: Selective jamming of LoRaWAN using commodity hardware. In: MobiQuitous 2017: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2017) Aras, E., Small, N., Ramachandran, G.S., St\'{e}phane, D., Joosen, W., Hughes, D.: Selective jamming of LoRaWAN using commodity hardware. In: MobiQuitous 2017: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2017)
17.
Zurück zum Zitat Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13, 245–257 (2011)CrossRef Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13, 245–257 (2011)CrossRef
18.
Zurück zum Zitat Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sensor Netw. 9(8), 794326 (2013). Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sensor Netw. 9(8), 794326 (2013).
19.
Zurück zum Zitat Crnogorac, J., Crnogorac, J., Vučinić, M., Kočan, E., Watteyne, T.: Dense multi-channel sniffing in large IoT networks. IEEE Access 10, 105101–105110 (2022)CrossRef Crnogorac, J., Crnogorac, J., Vučinić, M., Kočan, E., Watteyne, T.: Dense multi-channel sniffing in large IoT networks. IEEE Access 10, 105101–105110 (2022)CrossRef
20.
Zurück zum Zitat Andreica, G.R., Bozga, L., Zinca, D., Dobrota, V.: Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. In: 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) (2020) Andreica, G.R., Bozga, L., Zinca, D., Dobrota, V.: Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. In: 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet) (2020)
21.
Zurück zum Zitat Sunardi, A.: Yudhana and Furizal, “Tsukamoto fuzzy inference system on internet of things-based for room temperature and humidity control,.” IEEE Access 11, 6209–6227 (2023)CrossRef Sunardi, A.: Yudhana and Furizal, “Tsukamoto fuzzy inference system on internet of things-based for room temperature and humidity control,.” IEEE Access 11, 6209–6227 (2023)CrossRef
22.
Zurück zum Zitat Gomez, C., Chessa, S., Fleury, A., Roussos, G., Preuveneers, D.: Internet of things for enabling smart environments: a technology-centric perspective. J. Ambient Intell. Smart Environ. 11(1), 23–43 (2019)CrossRef Gomez, C., Chessa, S., Fleury, A., Roussos, G., Preuveneers, D.: Internet of things for enabling smart environments: a technology-centric perspective. J. Ambient Intell. Smart Environ. 11(1), 23–43 (2019)CrossRef
23.
Zurück zum Zitat Tabaa, M., Monteiro, F., Bensag, H., Dandache, A.: Green industrial internet of things from a smart industry perspectives. Energy Rep. 6, 430–446 (2020)CrossRef Tabaa, M., Monteiro, F., Bensag, H., Dandache, A.: Green industrial internet of things from a smart industry perspectives. Energy Rep. 6, 430–446 (2020)CrossRef
24.
Zurück zum Zitat Park, M., Oh, H., Lee, K.: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective. Sensors 19(9), 2148 (2019) Park, M., Oh, H., Lee, K.: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective. Sensors 19(9), 2148 (2019)
25.
Zurück zum Zitat Altayaran, S., Elmedany, W.: Security threats of application programming interface (API's) in internet of things (IoT) communications. In: 4th Smart Cities Symposium (SCS 2021) (2021) Altayaran, S., Elmedany, W.: Security threats of application programming interface (API's) in internet of things (IoT) communications. In: 4th Smart Cities Symposium (SCS 2021) (2021)
26.
Zurück zum Zitat Balliu, M., Bastys, I., Sabelfeld, A.: Securing IoT Apps. IEEE Secur. Privacy 17(5), 22–29 (2019) Balliu, M., Bastys, I., Sabelfeld, A.: Securing IoT Apps. IEEE Secur. Privacy 17(5), 22–29 (2019)
27.
Zurück zum Zitat Zikria, Y.B., Ali, R., Afzal, M.K., Kim, S.W.: Next-generation internet of things (IoT): opportunities, challenges, and solutions. Sensors, vol. 21(4), 1174 (2021) Zikria, Y.B., Ali, R., Afzal, M.K., Kim, S.W.: Next-generation internet of things (IoT): opportunities, challenges, and solutions. Sensors, vol. 21(4), 1174 (2021)
28.
Zurück zum Zitat El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 19(5), 1141 (2019) El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 19(5), 1141 (2019)
29.
Zurück zum Zitat Ding, S., Cao, J., Li, C., Fan, K., Li, H.: A Novel attribute-based access control scheme using blockchain for IoT. IEEE Access 7, 38431–38441 (2019)CrossRef Ding, S., Cao, J., Li, C., Fan, K., Li, H.: A Novel attribute-based access control scheme using blockchain for IoT. IEEE Access 7, 38431–38441 (2019)CrossRef
30.
Zurück zum Zitat Mandal, S., Bera, B., Sutrala, A.K., Das, A.K., Choo, K.K.R., Park, Y.: Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Int. Things J. 7(4), 3184–3197 (2020) Mandal, S., Bera, B., Sutrala, A.K., Das, A.K., Choo, K.K.R., Park, Y.: Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Int. Things J. 7(4), 3184–3197 (2020)
31.
Zurück zum Zitat Li, D., Han, D., Crespi, N., Minerva, R., Li, K.-C.: A blockchain-based secure storage and access control scheme for supply chain finance. J. Supercomput. 79(1), 109–138 (2023)CrossRef Li, D., Han, D., Crespi, N., Minerva, R., Li, K.-C.: A blockchain-based secure storage and access control scheme for supply chain finance. J. Supercomput. 79(1), 109–138 (2023)CrossRef
32.
Zurück zum Zitat Qaddoura, R., M. Al-Zoubi, A., Faris, H., Almomani, I.: A multi-layer classification approach for intrusion detection in IoT networks based on deep learning. Sensors 21(9), 2987 (2021) Qaddoura, R., M. Al-Zoubi, A., Faris, H., Almomani, I.: A multi-layer classification approach for intrusion detection in IoT networks based on deep learning. Sensors 21(9), 2987 (2021)
33.
Zurück zum Zitat Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. 527, 493–510 (2020)MathSciNetCrossRefMATH Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. 527, 493–510 (2020)MathSciNetCrossRefMATH
34.
Zurück zum Zitat Perazzo, P., Righetti, F., La Manna, M., Vallati, C.: Performance evaluation of attribute-based encryption on constrained IoT devices. Comput. Commun. 170, 151–163 (2021) Perazzo, P., Righetti, F., La Manna, M., Vallati, C.: Performance evaluation of attribute-based encryption on constrained IoT devices. Comput. Commun. 170, 151–163 (2021)
35.
Zurück zum Zitat McKay, K., Bassham, L., Sönmez Turan, M., Mouha, N.: Report on Lightweight Cryptography. In: NIST (2017) McKay, K., Bassham, L., Sönmez Turan, M., Mouha, N.: Report on Lightweight Cryptography. In: NIST (2017)
36.
Zurück zum Zitat Tropea, M., Spina, M.G., De Rango, F., Gentile, A.F.: Gentile, “security in wireless sensor networks: a cryptography performance analysis at MAC Layer. Future Internet, 14(5), 145 (2022) Tropea, M., Spina, M.G., De Rango, F., Gentile, A.F.: Gentile, “security in wireless sensor networks: a cryptography performance analysis at MAC Layer. Future Internet, 14(5), 145 (2022)
37.
Zurück zum Zitat Thakor, V.A., Razzaque, M.A., Khandaker, M.R.A.: Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9, 28177–28193 (2021)CrossRef Thakor, V.A., Razzaque, M.A., Khandaker, M.R.A.: Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9, 28177–28193 (2021)CrossRef
38.
Zurück zum Zitat Pareek, M., Mishra, G., Kohli, V.: Deep learning based analysis of key scheduling algorithm of PRESENT cipher. IACR Cryptol. ePrint Arch. 2020, 981 (2020) Pareek, M., Mishra, G., Kohli, V.: Deep learning based analysis of key scheduling algorithm of PRESENT cipher. IACR Cryptol. ePrint Arch. 2020, 981 (2020)
40.
Zurück zum Zitat Lo, O., Buchanan, W.J., Carson, D.: Correlation power analysis on the PRESENT block cipher on an embedded device. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (2018) Lo, O., Buchanan, W.J., Carson, D.: Correlation power analysis on the PRESENT block cipher on an embedded device. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (2018)
41.
Zurück zum Zitat Vaudenay, S. (ed.): Progress in Cryptology – AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings. Springer Berlin Heidelberg, Berlin, Heidelberg (2008) Vaudenay, S. (ed.): Progress in Cryptology – AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings. Springer Berlin Heidelberg, Berlin, Heidelberg (2008)
42.
Zurück zum Zitat Pieprzyk, J.: The 10th Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings, Springer 2010, 302–307 (2010) Pieprzyk, J.: The 10th Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings, Springer 2010, 302–307 (2010)
43.
Zurück zum Zitat Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Advances in Cryptology – CRYPTO 2003. Springer-Verlag, Boston (2003)MATH Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Advances in Cryptology – CRYPTO 2003. Springer-Verlag, Boston (2003)MATH
44.
Zurück zum Zitat Perry, L.: IoT Security. In: Internet of Things for Architects, p. 515. Packt Publishing Lt, Mumbai (2018) Perry, L.: IoT Security. In: Internet of Things for Architects, p. 515. Packt Publishing Lt, Mumbai (2018)
45.
Zurück zum Zitat Wheeler, D.M., Fagbemi, D.D.: Security architecture for real IoT systems. In: The IoT architect's guide to attainable security and privacy, Boca Raton, CRC Press, p. 497 (2020) Wheeler, D.M., Fagbemi, D.D.: Security architecture for real IoT systems. In: The IoT architect's guide to attainable security and privacy, Boca Raton, CRC Press, p. 497 (2020)
Metadaten
Titel
Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher
verfasst von
Van Nam Ngo
Anh Ngoc Le
Do-Hyeun Kim
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-8211-0_27

Premium Partner