Skip to main content
Erschienen in: Wireless Networks 2/2021

15.01.2021

Security of internet of things based on cryptographic algorithms: a survey

verfasst von: Seyyed Keyvan Mousavi, Ali Ghaffari, Sina Besharat, Hamed Afshari

Erschienen in: Wireless Networks | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of interconnected objects. Thus, the security of IoT is highly important. Scalable applications and services are vulnerable to various attacks and information leakage, demanding greater levels of security and privacy. For instance, hacking personal information is a challenge in this regard. The present study is an investigation of symmetric, asymmetric and hybrid encryption algorithms for IoT security. Asymmetric key encryption to ensure secure communication between multiple users and thereby avoiding distributing key on an insecure channel. All algorithms are compared based on security factors. Results indicate that Elliptic Curve Cryptography (ECC) has a better performance than other algorithms in the study. ECC to generate smaller, faster and reliable cryptography keys. Also, ECC decreases the memory requirements and the execution encryption/decryption time. This study helps to understand the importance of several security factors in IoT and advancements in cryptography algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
22.
Zurück zum Zitat Bovenzi, G., Ciuonzo, D., Persico, V., Pescapè, A., & Rossi, P. S. (2019). IoT-enabled distributed detection of a nuclear radioactive source via generalized score tests. In Advances in signal processing and intelligent recognition systems. Singapore: Springer Singapore. Bovenzi, G., Ciuonzo, D., Persico, V., Pescapè, A., & Rossi, P. S. (2019). IoT-enabled distributed detection of a nuclear radioactive source via generalized score tests. In Advances in signal processing and intelligent recognition systems. Singapore: Springer Singapore.
24.
Zurück zum Zitat Ciuonzo, D., Gelli, G., Pescapé, A., & Verde, F. (2019). Decision fusion rules in ambient backscatter wireless sensor networks. In 2019 IEEE 30th annual international symposium on personal, indoor and mobile radio communications (PIMRC). Ciuonzo, D., Gelli, G., Pescapé, A., & Verde, F. (2019). Decision fusion rules in ambient backscatter wireless sensor networks. In 2019 IEEE 30th annual international symposium on personal, indoor and mobile radio communications (PIMRC).
25.
Zurück zum Zitat Azari, L., & Ghaffari, A. (2015). Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks. Indian Journal of Science and Technology, 8(9), 859–867.CrossRef Azari, L., & Ghaffari, A. (2015). Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks. Indian Journal of Science and Technology, 8(9), 859–867.CrossRef
26.
Zurück zum Zitat Ghaffari, A. (2014). Designing a wireless sensor network for ocean status notification system. Indian Journal of Science and Technology, 7(6), 809.CrossRef Ghaffari, A. (2014). Designing a wireless sensor network for ocean status notification system. Indian Journal of Science and Technology, 7(6), 809.CrossRef
27.
Zurück zum Zitat Ghaffari, A., & Rahmani, A. (2008). Fault tolerant model for data dissemination in wireless sensor networks. In 2008 international symposium on information technology. IEEE. Ghaffari, A., & Rahmani, A. (2008). Fault tolerant model for data dissemination in wireless sensor networks. In 2008 international symposium on information technology. IEEE.
28.
Zurück zum Zitat Ghaffari, A., Rahmani, A., & Khademzadeh, A. (2011). Energy-efficient and QoS-aware geographic routing protocol for wireless sensor networks. IEICE Electronics Express, 8(8), 582–588.CrossRef Ghaffari, A., Rahmani, A., & Khademzadeh, A. (2011). Energy-efficient and QoS-aware geographic routing protocol for wireless sensor networks. IEICE Electronics Express, 8(8), 582–588.CrossRef
29.
Zurück zum Zitat Ghaffari, A., & Takanloo, V. A. (2011). QoS-based routing protocol with load balancing for wireless multimedia sensor networks using genetic algorithm. World Applied Sciences Journal, 15(12), 1659–1666. Ghaffari, A., & Takanloo, V. A. (2011). QoS-based routing protocol with load balancing for wireless multimedia sensor networks using genetic algorithm. World Applied Sciences Journal, 15(12), 1659–1666.
34.
Zurück zum Zitat Rauscher, J., & Bauer, B. (2018). Safety and security architecture analyses framework for the internet of things of medical devices. In 2018 IEEE 20th international conference on e-health networking, applications and services (Healthcom). Rauscher, J., & Bauer, B. (2018). Safety and security architecture analyses framework for the internet of things of medical devices. In 2018 IEEE 20th international conference on e-health networking, applications and services (Healthcom).
35.
Zurück zum Zitat Celia, L., & Cungang, Y. (2018). (WIP) Authenticated key management protocols for internet of things. IEEE International Congress on Internet of Things (ICIOT) 126–129. Celia, L., & Cungang, Y. (2018). (WIP) Authenticated key management protocols for internet of things. IEEE International Congress on Internet of Things (ICIOT) 126–129.
36.
Zurück zum Zitat Rajashree, S., Shah, P. G., & Murali, S. (2018). Security model for internet of things end devices. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). Rajashree, S., Shah, P. G., & Murali, S. (2018). Security model for internet of things end devices. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData).
37.
Zurück zum Zitat Deshmukh, S., & Sonavane, S. S. (2017). Security protocols for internet of things: A survey. In 2017 International conference on Nextgen electronic technologies: Silicon to software (ICNETS2). Deshmukh, S., & Sonavane, S. S. (2017). Security protocols for internet of things: A survey. In 2017 International conference on Nextgen electronic technologies: Silicon to software (ICNETS2).
38.
Zurück zum Zitat Lu, X., Pan, Z., & Xian, H. (2019). An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. Computers & Security. (in press, corrected proof). Lu, X., Pan, Z., & Xian, H. (2019). An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. Computers & Security. (in press, corrected proof).
41.
Zurück zum Zitat Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef
42.
Zurück zum Zitat Kandhoul, N., & Dhurandher, S. K. (2019). An asymmetric RSA-based security approach for opportunistic IoT. In 2nd international conference on wireless intelligent and distributed environment for communication. Cham: Springer International Publishing. Kandhoul, N., & Dhurandher, S. K. (2019). An asymmetric RSA-based security approach for opportunistic IoT. In 2nd international conference on wireless intelligent and distributed environment for communication. Cham: Springer International Publishing.
43.
Zurück zum Zitat Jin, B. W., Park, J. O., & Mun, H. J. (2019). A design of secure communication protocol using RLWE based homomorphic encryption in IoT convergence cloud environment. Wireless Personal Communications, 105, 599–618.CrossRef Jin, B. W., Park, J. O., & Mun, H. J. (2019). A design of secure communication protocol using RLWE based homomorphic encryption in IoT convergence cloud environment. Wireless Personal Communications, 105, 599–618.CrossRef
44.
Zurück zum Zitat Miller, V. S. (1986). Use of elliptic curves in cryptography. In Advances in cryptology—CRYPTO ’85 proceedings. Berlin, Heidelberg: Springer. Miller, V. S. (1986). Use of elliptic curves in cryptography. In Advances in cryptology—CRYPTO ’85 proceedings. Berlin, Heidelberg: Springer.
45.
Zurück zum Zitat Harbi, Y., Aliouat, Z., Harous, S., & Bentaleb, A. (2019). Secure data transmission scheme based on elliptic curve cryptography for internet of things. In Modelling and implementation of complex systems. Cham: Springer International Publishing. Harbi, Y., Aliouat, Z., Harous, S., & Bentaleb, A. (2019). Secure data transmission scheme based on elliptic curve cryptography for internet of things. In Modelling and implementation of complex systems. Cham: Springer International Publishing.
47.
Zurück zum Zitat Shah, D. P., & Shah, P. G. (2018). Revisting of elliptical curve cryptography for securing internet of things (IOT). IEEE, 1–3. Shah, D. P., & Shah, P. G. (2018). Revisting of elliptical curve cryptography for securing internet of things (IOT). IEEE, 1–3.
48.
Zurück zum Zitat Sharma, C., & Sunanda. (2018). Performance analysis of ECC and RSA for securing CoAP-based remote health monitoring system. In Ambient communications and computer systems. Singapore: Springer Singapore. Sharma, C., & Sunanda. (2018). Performance analysis of ECC and RSA for securing CoAP-based remote health monitoring system. In Ambient communications and computer systems. Singapore: Springer Singapore.
50.
Zurück zum Zitat Yang, X., Yi, X., Zeng, Y., Khalil, I., Huang, X., & Nepal, S. (2018). An improved lightweight RFID authentication protocol for internet of things. Web Information Systems Engineering—WISE, 111–126. Yang, X., Yi, X., Zeng, Y., Khalil, I., Huang, X., & Nepal, S. (2018). An improved lightweight RFID authentication protocol for internet of things. Web Information Systems Engineering—WISE, 111–126.
51.
Zurück zum Zitat Sasirekha, S., Swamynathan, S., & Suganya, S. (2018). An ECC-based algorithm to handle secure communication between heterogeneous IoT devices. In Advances in electronics, communication and computing. Singapore: Springer Singapore. Sasirekha, S., Swamynathan, S., & Suganya, S. (2018). An ECC-based algorithm to handle secure communication between heterogeneous IoT devices. In Advances in electronics, communication and computing. Singapore: Springer Singapore.
54.
Zurück zum Zitat Diro, A. A., Chilamkurti, N., & Veeraraghavan, P. (2017). Elliptic curve based cybersecurity schemes for publish-subscribe internet of things. In Quality, reliability, security and robustness in heterogeneous networks. Cham: Springer International Publishing. Diro, A. A., Chilamkurti, N., & Veeraraghavan, P. (2017). Elliptic curve based cybersecurity schemes for publish-subscribe internet of things. In Quality, reliability, security and robustness in heterogeneous networks. Cham: Springer International Publishing.
55.
Zurück zum Zitat Hasan, H., Salah, T., Shehada, D., Zemerly, M. J., Yeun, C. Y., Al-Qutayri, M., & Al-Hammadi, Y. (2017). Secure lightweight ECC-based protocol for multi-agent IoT systems. In 2017 IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob). Hasan, H., Salah, T., Shehada, D., Zemerly, M. J., Yeun, C. Y., Al-Qutayri, M., & Al-Hammadi, Y. (2017). Secure lightweight ECC-based protocol for multi-agent IoT systems. In 2017 IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob).
56.
Zurück zum Zitat Shruti, P., & Chandraleka, R. (2017). Elliptic curve cryptography security in the context of internet of things. International Journal of Scientific & Engineering Research, 8(5), 90–94. Shruti, P., & Chandraleka, R. (2017). Elliptic curve cryptography security in the context of internet of things. International Journal of Scientific & Engineering Research, 8(5), 90–94.
57.
Zurück zum Zitat Nayak, B. (2017). A secure ID-based signcryption scheme based on elliptic curve cryptography. International Journal of Computational Intelligence Studies, 6(2), 150–156.CrossRef Nayak, B. (2017). A secure ID-based signcryption scheme based on elliptic curve cryptography. International Journal of Computational Intelligence Studies, 6(2), 150–156.CrossRef
59.
Zurück zum Zitat Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms (IJAIP), 9(2). Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms (IJAIP), 9(2).
60.
Zurück zum Zitat Dhillon, P. K., & Kalra, S. (2016). Elliptic curve cryptography for real time embedded systems in IoT networks. In 2016 5th international conference on wireless networks and embedded systems (WECON). Dhillon, P. K., & Kalra, S. (2016). Elliptic curve cryptography for real time embedded systems in IoT networks. In 2016 5th international conference on wireless networks and embedded systems (WECON).
63.
Zurück zum Zitat Das, M. L. (2013). Strong security and privacy of RFID system for internet of things infrastructure. In International conference on security, privacy, and applied cryptography engineering, SPACE 2013: Security, privacy, and applied cryptography engineering (pp. 56–69). Das, M. L. (2013). Strong security and privacy of RFID system for internet of things infrastructure. In International conference on security, privacy, and applied cryptography engineering, SPACE 2013: Security, privacy, and applied cryptography engineering (pp. 56–69).
65.
Zurück zum Zitat Salas, M. (2013). A secure framework for OTA smart device ecosystems using ECC encryption and biometrics. In Advances in security of information and communication networks. Berlin, Heidelberg: Springer. Salas, M. (2013). A secure framework for OTA smart device ecosystems using ECC encryption and biometrics. In Advances in security of information and communication networks. Berlin, Heidelberg: Springer.
66.
Zurück zum Zitat Marin, L., Jara, A. J., & Skarmeta, A. F. G. (2011). Shifting primes: Extension of pseudo-mersenne primes to optimize ECC for MSP430-based future internet of things devices. In Availability, reliability and security for business, enterprise and health information systems. Berlin, Heidelberg: Springer. Marin, L., Jara, A. J., & Skarmeta, A. F. G. (2011). Shifting primes: Extension of pseudo-mersenne primes to optimize ECC for MSP430-based future internet of things devices. In Availability, reliability and security for business, enterprise and health information systems. Berlin, Heidelberg: Springer.
67.
Zurück zum Zitat Bruni, A., Sahl Jørgensen, T., Grønbech Petersen, T., & Schürmann, C. (2018). Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC). In Security standardisation research. Cham: Springer International Publishing. Bruni, A., Sahl Jørgensen, T., Grønbech Petersen, T., & Schürmann, C. (2018). Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC). In Security standardisation research. Cham: Springer International Publishing.
68.
Zurück zum Zitat Shah, R. H., & Salapurkar, D. P. (2017). A multifactor authentication system using secret splitting in the perspective of cloud of things. In 2017 international conference on emerging trends & innovation in ICT (ICEI). Shah, R. H., & Salapurkar, D. P. (2017). A multifactor authentication system using secret splitting in the perspective of cloud of things. In 2017 international conference on emerging trends & innovation in ICT (ICEI).
69.
Zurück zum Zitat Pérez, S., Rotondi, D., Pedone, D., Straniero, L., Núñez, M. J., & Gigante, F. (2018). Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In Innovative mobile and internet services in ubiquitous computing. Cham: Springer International Publishing. Pérez, S., Rotondi, D., Pedone, D., Straniero, L., Núñez, M. J., & Gigante, F. (2018). Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In Innovative mobile and internet services in ubiquitous computing. Cham: Springer International Publishing.
72.
Zurück zum Zitat Pace, G. J., Picazo-Sanchez, P., & Schneider, G. (2018). Migrating monitors + ABE: A suitable combination for secure IoT? In Leveraging applications of formal methods, verification and validation. Industrial practice. Cham: Springer International Publishing. Pace, G. J., Picazo-Sanchez, P., & Schneider, G. (2018). Migrating monitors + ABE: A suitable combination for secure IoT? In Leveraging applications of formal methods, verification and validation. Industrial practice. Cham: Springer International Publishing.
74.
Zurück zum Zitat Gopinath, M. P., Tamizharasi, G. S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S. L., & Balamurugan, B. (2019). A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT). Neural Computing and Applications, 31(1), 293–308. https://doi.org/10.1007/s00521-018-3774-9.CrossRef Gopinath, M. P., Tamizharasi, G. S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S. L., & Balamurugan, B. (2019). A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT). Neural Computing and Applications, 31(1), 293–308. https://​doi.​org/​10.​1007/​s00521-018-3774-9.CrossRef
77.
Zurück zum Zitat Zhang, M. (2014). New model and construction of ABE: Achieving key resilient-leakage and attribute direct-revocation. In Information security and privacy. Cham: Springer International Publishing. Zhang, M. (2014). New model and construction of ABE: Achieving key resilient-leakage and attribute direct-revocation. In Information security and privacy. Cham: Springer International Publishing.
79.
Zurück zum Zitat Chandi, P., Sharma, A., Chhabra, A., & Gupta, P. (2019). A DES-based mechanism to secure personal data on the internet of things. In ICCCE 2018. Singapore: Springer Singapore. Chandi, P., Sharma, A., Chhabra, A., & Gupta, P. (2019). A DES-based mechanism to secure personal data on the internet of things. In ICCCE 2018. Singapore: Springer Singapore.
80.
Zurück zum Zitat Cruz-Duarte, S., Sastoque-Mahecha, M., Gaona-García, E., & Gaona-García, P. (2019). Security scheme for IoT environments in smart grids. In Information systems and technologies to support learning. Cham: Springer International Publishing. Cruz-Duarte, S., Sastoque-Mahecha, M., Gaona-García, E., & Gaona-García, P. (2019). Security scheme for IoT environments in smart grids. In Information systems and technologies to support learning. Cham: Springer International Publishing.
81.
Zurück zum Zitat Vidyashree, L., & Suresha, B. M. (2019). Methodology to secure agricultural data in IoT. In Emerging technologies in data mining and information security. Singapore: Springer Singapore. Vidyashree, L., & Suresha, B. M. (2019). Methodology to secure agricultural data in IoT. In Emerging technologies in data mining and information security. Singapore: Springer Singapore.
82.
Zurück zum Zitat Kiran Kumar, V. G., & Shantharama Rai, C. (2019). Implementation and analysis of cryptographic ciphers in FPGA. In Emerging technologies in data mining and information security. Singapore: Springer Singapore. Kiran Kumar, V. G., & Shantharama Rai, C. (2019). Implementation and analysis of cryptographic ciphers in FPGA. In Emerging technologies in data mining and information security. Singapore: Springer Singapore.
86.
Zurück zum Zitat Hu, C., Luo, J., Pu, Y., Yu, J., Zhao, R., Huang, H., & Xiang, T. (2018). An efficient privacy-preserving data aggregation scheme for IoT. In Wireless algorithms, systems, and applications. Cham: Springer International Publishing. Hu, C., Luo, J., Pu, Y., Yu, J., Zhao, R., Huang, H., & Xiang, T. (2018). An efficient privacy-preserving data aggregation scheme for IoT. In Wireless algorithms, systems, and applications. Cham: Springer International Publishing.
87.
Zurück zum Zitat Tsai, K. L., Huang, Y. L., Leu, F. Y., You, I. I., Huang, Y. L., & Tsai, C. H. (2018). AES-128 based secure low power communication for LoRaWAN IoT environments, security and trusted computing for industrial internet of things. IEEE, 45325–45334. Tsai, K. L., Huang, Y. L., Leu, F. Y., You, I. I., Huang, Y. L., & Tsai, C. H. (2018). AES-128 based secure low power communication for LoRaWAN IoT environments, security and trusted computing for industrial internet of things. IEEE, 45325–45334.
88.
Zurück zum Zitat Newe, T., Rao, M., Toal, D., Dooly, G., Omerdic, E., & Mathur, A., et al. (2017). Efficient and high speed FPGA bump in the wire implementation for data integrity and confidentiality services in the IoT. In O. A. Postolache (Ed.), Sensors for everyday life: Healthcare settings (pp. 259–285). Cham: Springer International Publishing.CrossRef Newe, T., Rao, M., Toal, D., Dooly, G., Omerdic, E., & Mathur, A., et al. (2017). Efficient and high speed FPGA bump in the wire implementation for data integrity and confidentiality services in the IoT. In O. A. Postolache (Ed.), Sensors for everyday life: Healthcare settings (pp. 259–285). Cham: Springer International Publishing.CrossRef
89.
Zurück zum Zitat Bohan, Z., Xu, W., Kaili, Z., & Xueyuan, Z. (2013). Encryption node design in internet of things based on fingerprint features and CC2530. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing. Bohan, Z., Xu, W., Kaili, Z., & Xueyuan, Z. (2013). Encryption node design in internet of things based on fingerprint features and CC2530. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing.
90.
Zurück zum Zitat Schneier, B. (1993). Description of a new variable-length key, 64-bit block cipher (blowfish), fast software encryption, Cambridge security workshop proceedings. Springer (pp. 191–204). Schneier, B. (1993). Description of a new variable-length key, 64-bit block cipher (blowfish), fast software encryption, Cambridge security workshop proceedings. Springer (pp. 191–204).
91.
Zurück zum Zitat Corpuz, R. R., Gerardo, B. D., & Medina, R. P. (2018). Using a modified approach of blowfish algorithm for data security in cloud computing, ICIT 2018, Hong Kong (pp. 157–162). Corpuz, R. R., Gerardo, B. D., & Medina, R. P. (2018). Using a modified approach of blowfish algorithm for data security in cloud computing, ICIT 2018, Hong Kong (pp. 157–162).
92.
Zurück zum Zitat Suchdeo, M., Mawane, D., Negandhi, M., Sarkar, S., & Prajapat, S. (2018). Towards performance analysis of symmetric key algorithm on n-core systems: An IOT perspective. International Journal of Computer Sciences and Engineering, 6(6), 1127–1129.CrossRef Suchdeo, M., Mawane, D., Negandhi, M., Sarkar, S., & Prajapat, S. (2018). Towards performance analysis of symmetric key algorithm on n-core systems: An IOT perspective. International Journal of Computer Sciences and Engineering, 6(6), 1127–1129.CrossRef
93.
Zurück zum Zitat Deshpande, K., & Singh, P. (2018). Performance evaluation of cryptographic ciphers on IoT devices, international conference on recent trends in computational engineering and technologies (ICTRCET'18) (pp. 1–6). Deshpande, K., & Singh, P. (2018). Performance evaluation of cryptographic ciphers on IoT devices, international conference on recent trends in computational engineering and technologies (ICTRCET'18) (pp. 1–6).
95.
Zurück zum Zitat Prasetyo, K. N., Purwanto, Y., & Darlis, D. (2014). An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In 2014 2nd international conference on information and communication technology (ICoICT). Prasetyo, K. N., Purwanto, Y., & Darlis, D. (2014). An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In 2014 2nd international conference on information and communication technology (ICoICT).
96.
Zurück zum Zitat Xie, C., & Deng, S.-T. (2017). Research and application of security and privacy in industrial internet of things based on fingerprint encryption. In Industrial IoT technologies and applications. Cham: Springer International Publishing. Xie, C., & Deng, S.-T. (2017). Research and application of security and privacy in industrial internet of things based on fingerprint encryption. In Industrial IoT technologies and applications. Cham: Springer International Publishing.
98.
Zurück zum Zitat Zhang, Y., He, D., & Choo, K. K. R. (2018). BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wireless Communications and Mobile Computing, 1–9. Zhang, Y., He, D., & Choo, K. K. R. (2018). BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wireless Communications and Mobile Computing, 1–9.
99.
Zurück zum Zitat Sankaralingam, S. A., Usha, G., & Acharya, A. (2018). A hybrid cryptographic algorithm based on AES and SHA1 in RFID. International Journal of Pure and Applied Mathematics, 118(11), 835–840. Sankaralingam, S. A., Usha, G., & Acharya, A. (2018). A hybrid cryptographic algorithm based on AES and SHA1 in RFID. International Journal of Pure and Applied Mathematics, 118(11), 835–840.
100.
Zurück zum Zitat Schmitt, C., Kothmayr, T., Hu, W., & Stiller, B. (2017). Two-way authentication for the internet-of-things. In D. P. Acharjya & M. K. Geetha (Eds.), Internet of things: Novel advances and envisioned applications (pp. 27–56). Cham: Springer International Publishing.CrossRef Schmitt, C., Kothmayr, T., Hu, W., & Stiller, B. (2017). Two-way authentication for the internet-of-things. In D. P. Acharjya & M. K. Geetha (Eds.), Internet of things: Novel advances and envisioned applications (pp. 27–56). Cham: Springer International Publishing.CrossRef
102.
Zurück zum Zitat Darwish, A., El-Gendy, M. M., Hassanien, A. E., & New, A., et al. (2017). Hybrid cryptosystem for internet of things applications. In A. E. Hassanien (Ed.), Multimedia forensics and security: Foundations, innovations, and applications (pp. 365–380). Cham: Springer International Publishing.CrossRef Darwish, A., El-Gendy, M. M., Hassanien, A. E., & New, A., et al. (2017). Hybrid cryptosystem for internet of things applications. In A. E. Hassanien (Ed.), Multimedia forensics and security: Foundations, innovations, and applications (pp. 365–380). Cham: Springer International Publishing.CrossRef
103.
Zurück zum Zitat Mohammed, A. F., & Qyser, A. A. M. (2020). A hybrid approach for secure iris-based authentication in IoT. In ICICCT 2019—system reliability, quality control, safety, maintenance and management. Singapore: Springer Singapore. Mohammed, A. F., & Qyser, A. A. M. (2020). A hybrid approach for secure iris-based authentication in IoT. In ICICCT 2019—system reliability, quality control, safety, maintenance and management. Singapore: Springer Singapore.
105.
Zurück zum Zitat Qiaohong, Z., Xiaoyu, Y., & Xie, W. (2015). Data encryption for remote monitoring system based on internet of things in mobile mode. In Human centered computing. Cham: Springer International Publishing. Qiaohong, Z., Xiaoyu, Y., & Xie, W. (2015). Data encryption for remote monitoring system based on internet of things in mobile mode. In Human centered computing. Cham: Springer International Publishing.
106.
Zurück zum Zitat Zhao, X., Qi, L., Li, Y., Chen, J., & Shen, H. (2015). Data encryption and transmission technology for cotton of IoT security. In LISS 2014. Berlin, Heidelberg: Springer. Zhao, X., Qi, L., Li, Y., Chen, J., & Shen, H. (2015). Data encryption and transmission technology for cotton of IoT security. In LISS 2014. Berlin, Heidelberg: Springer.
107.
Zurück zum Zitat Xin, M. (2015). A mixed encryption algorithm used in internet of things security transmission system. In 2015 international conference on cyber-enabled distributed computing and knowledge discovery. Xin, M. (2015). A mixed encryption algorithm used in internet of things security transmission system. In 2015 international conference on cyber-enabled distributed computing and knowledge discovery.
109.
Zurück zum Zitat Guo, R., Wen, Q., Shi, H., Jin, Z., & Zhang, H. (2014). Certificateless public key encryption scheme with hybrid problems and its application to internet of things. Hindawi Publishing Corporation, Mathematical Problems in Engineering (pp. 1–9). Guo, R., Wen, Q., Shi, H., Jin, Z., & Zhang, H. (2014). Certificateless public key encryption scheme with hybrid problems and its application to internet of things. Hindawi Publishing Corporation, Mathematical Problems in Engineering (pp. 1–9).
Metadaten
Titel
Security of internet of things based on cryptographic algorithms: a survey
verfasst von
Seyyed Keyvan Mousavi
Ali Ghaffari
Sina Besharat
Hamed Afshari
Publikationsdatum
15.01.2021
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02535-5

Weitere Artikel der Ausgabe 2/2021

Wireless Networks 2/2021 Zur Ausgabe