scholarly journals A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

2021 ◽  
Vol 10 (2) ◽  
pp. 46-53
Author(s):  
Jihane Jebrane ◽  
Saiida Lazaar

In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.

2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2012 ◽  
Vol 3 (2) ◽  
pp. 36-49 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Osamah Ghaleb

This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this relation. Discussion, conclusion and future work are stated at the end of this paper.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2020 ◽  
Author(s):  
Yong Weixiong ◽  
Kohei Dozono ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.


Author(s):  
Greg Gogolin

This chapter looks at security and privacy concerns of virtual worlds by investigating the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, and virtual worlds. Security and privacy concerns will be investigated in the context of exploits and IT-related security risks, access management and confidentiality, reputation and product risk management, resource management, financial considerations and accountability, and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security -confidentiality, integrity, and availability - provide an overall framework for the chapter.


Author(s):  
V. Jeevika Tharini ◽  
S. Vijayarani

One of the best-known features of IoT is automation. Because of this, IoT is a much-needed field for many applications, namely emergency and healthcare domains. IoT has made many revolutionary changes in the healthcare industry. IoT paves the way to numerous advancements for healthcare. The possibilities of IoT have reached their peak in the commercial industry and health sector. In recent years, serious concerns have been raised over the control and access of one's individual information. Privacy and security of the IoT devices can be compromised by intruders. Apart from the numerous benefits of IoTs, there are several security and privacy concerns to consider. A brief overview of different kinds of security attacks, solution for the attacks, privacy and security issues are discussed in this chapter.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6131
Author(s):  
Mamun Abu-Tair ◽  
Soufiene Djahel ◽  
Philip Perry ◽  
Bryan Scotney ◽  
Unsub Zia ◽  
...  

Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested.


Sign in / Sign up

Export Citation Format

Share Document