A Review of Encryption Techniques in IoT Devices

ABSTRACT

IoT devices are now frequently used in living spaces, education systems, military, police surveillance mechanisms and critical government systems. At the same time, cyberattacks against IoT devices are on the rise. The main element of protecting Io…

 

See full abstracts, authors, references, citations & other publication information.

MORE INFORMATION >>.

+

…T security is encryption methods. However, it is difficult to say that each of the encryption methods with dozens of different approaches can provide security for IoT devices. This study examines symmetric, asymmetric, hybrid, lightweight, Authenticated Encryption with Associated Data (AEAD) and postquantum encryptions, which are among the encryption methods used to ensure IoT security. In addition, the study has a wide examination of the differences, advantages, disadvantages, complexity and costs between the mentioned methods. Finally, the study conveys the results of the examined encryption methods against popular attack methods. Our study reveals that while a small portion of current IoT encryption methods uses asymmetric or symmetric encryption methods, hybrid and lightweight encryption techniques make up most of the remaining work. Although lightweight methods have been getting popular in the IoT field, it does not create a balance between cost and security, unlike hybrid encryption methods.

Full Text/Reference Website: https://www.cscjournals.org/library/manuscriptinfo.php?mc=IJS-167

A Review of Encryption Techniques in IoT Devices
A Review of Encryption Techniques in IoT Devices

AUTHORS
Mr. Ahmet Furkan Aydogan – Computer Science, Sam Houston State University, Huntsville, 77340 – United States of America

Professor Amar Rasheed – Computer Science, Sam Houston State University, Huntsville, 77340 – United States of America

Professor Cihan Varol – Computer Science, Sam Houston State University, Huntsville, 77340 – United States of America

Professor Narasimha Karpoor Shashidhar – Computer Science, Sam Houston State University, Huntsville, 77340 – United States of America


KEYWORDS

Symmetric Encryption, Asymmetric Encryption, Hybrid Encryption, Lightweight Encryption, Authenticated Encryption with Associated Data (AEAD), Post-quantum encryption, IoT Security, IoT Encryption.

Indexing Keywords: A Review of Encryption Techniques in IoT Devices, Encryption Techniques in IoT Devices, Encryption Techniques, IoT Devices, IoT Devices Encryption Techniques.

Pages: 17-37
Revised: 31-03-2023
Published: 30-04-2023

Published in International Journal of Security (IJS).

Volume: 14
Issue: 1
Publication Date: 30-04-2023


*Randomly selected references used in the publication “A Review of Encryption Techniques in IoT Devices”.

SEE THE LINK >>

  • Agren, M., & al., E. (2011). Grain-128a: A New Version of Grain-128 With Optional Authentication. International Journal of Wireless and Mobile Computing, 5(1), 48. doi:10.1504/ijwmc.2011.044106
  • Ajtai, M. (1996). Generating Hard Instances of Lattice Problems (Extended Abstract). Symposium on the Theory of Computing. doi:10.1145/237814.237838
  • Alrawi, O., & Others. (2019, May). SoK: Security Evaluation of Home-Based IoT Deployments. 2019 IEEE Symposium on Security and Privacy (SP). doi:10.1109/sp.2019.00013
  • Avast, P. (2019b). Avast Highlights the Threat Landscape for 2019.
  • Avast. (2019a). Avast Smart Home Security Report 2019.
  • Bamiduro, W. (2018). Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018. Gartner.
  • Bao, Z., Wang, L., Guo, J., Wang, L., & Wu, W. (2019). PHOTON-Beetle Authenticated Encryption and Hash Family, Submission to the NIST Lightweight Cryptography Standardization Process.
  • Beierle, C. (2020). Lightweight AEAD and Hashing Using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology. Retrieved from https://tosc.iacr.org/index.php/ToSC/article/view/8467.
  • Belguith, S., & Others. (2018). PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). doi:10.1109/cloud.2018.00137.
  • Bellare, M., Rogaway, P., & Wagner, D. (2003). A conventional authenticated-encryption mode. manuscript, April.

CITATIONS

Citations used in the publication “A Review of Encryption Techniques in IoT Devices”.

Currently there are no citations collected for this publication at scholarlyabstracts.com.

-


CONTACT US

Please feel free to us at scholarlyabstracts@gmail.com if you wish to:

  • Get your journal, conference or thesis, registered with us.
  • Update this publication content.
Scroll to Top