A Comparative Analysis of Lightweight Cryptographic Protocols for Enhanced Communication Security in Resource-Constrained Internet of Things (IoT) Environments
Keywords:
Internet of Things (IoT), Security Protocols, Lightweight Cryptography, Resource-Constrained Devices, Communication SecurityAbstract
IoT devices in cyber-physical systems and daily applications have expanded, ushering in linked intelligence. However, these devices' minimal processing power, memory, and battery life make communication channel security difficult. However, resource-constrained IoT devices cannot use traditional encryption, which is resilient but memory- and processing-intensive. This requires researching lightweight cryptographic techniques that balance IoT security with resource efficiency.
This study evaluates prevalent lightweight IoT security methods. Explore three popular protocols: LSMWP, CoAP with DTLS, and Efficient Cryptographic Primitives for IoT. Multiple tests include security, performance, and IoT use case compatibility.
Security of each protocol's ciphers and hash algorithms is researched. To protect IoT data confidentiality, integrity, and authenticity, this research assesses its resilience to well-known cryptanalytic assaults. This study evaluates each protocol's key management measures to prevent key exposure and device impersonation. Last, protocol message integrity protections are tested to avoid data manipulation during network transmission.
IoT devices with limited resources must function well. Protocol processing overhead is compared using published benchmarks. Communication latency, encryption/decryption, and message signing/verification are assessed. Each protocol's memory footprint is examined, taking IoT devices' limited memory into account. Each IoT protocol is examined in the study's conclusion. Data sensitivity, device processing, and application real-time restrictions are studied. The study maps protocol pros and cons to use scenarios to help developers and security experts choose the best IoT protocol.
This detailed review examines lightweight cryptographic methods for IoT security-performance trade-offs. The insights will improve IoT ecosystem dependability by improving communication security and efficiency.
References
1. A. Rahman, M. Atiqur Rahman, S. Islam, M. A. Mahmud, and A. Kader, "Lightweight Security Protocols for Internet of Things: A Review," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 4, pp. 1462-1468, 2019.
2. Banerjee, Utsav, et al. "eeDTLS: Energy-efficient datagram transport layer security for the Internet of Things." GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, 2017.
3. N. Asokan, W. Zhou, C. H. Kim, and M. G. Kayalar, "Lightweight secure messaging protocol for resource-constrained devices," IACR Cryptol. ePrint Archive, vol. 2014, p. 410, 2014.
4. H. Tschofnig and D. Basin, "DTLS: Datagram Transport Layer Security," RFC 6347, IETF, 2012.
5. Y. Liu and Z. Yu, "Efficient cryptographic primitives for internet of things security," in 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, IEEE, 2017.
6. A. Puttegowda, D. He, S. Banerjee, and J. Baek, "SPHINX: Lightweight Authenticated Encryption for Secure Communication in the Internet of Things," in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 1677-1688, 2017.
7. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Rechberger, "PRESENT: An Ultra-Lightweight Block Cipher," in Lecture Notes in Computer Science, pp. 450-466, Springer, Berlin, Heidelberg, 2007.
8. J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, "The LEA lightweight block cipher," in Cryptographic Hardware and Embedded Systems - CHES 2011, vol. 6911, pp. 301-316, Springer, Berlin, Heidelberg, 2011.
9. K. Gajek, N. Kumar, P. Landman, M. Rostovtsev, and K. Schindler, "Keccak: Pseudo-random functions and stream ciphers," Submission to NIST (Cryptographic Hash Algorithm Competition), vol. 3, pp. 1-54, 2013.
10. M. Dworkin, "Recommendation for Block Cipher Modes of Operation (CMBs) and Message Authentication Codes (MACs)," National Institute of Standards and Technology (NIST) Special Publication 800-38B, Dec. 2012.
11. D. Boneh and V. Shoup, "A practical PKI for electronic commerce," in Proceedings of the 1998 ACM SIGCOMM Conference on Data Communication, pp. 117-126, 1998.
12. D. Huang, M. Qu, and S. Guo, "Lightweight Cryptographic Algorithms for Resource-Constrained Devices in the Internet of Things," Security and Communication Networks, vol. 9, no. 18, pp. 5779-5793, 2016.
13. D. Le Hoang, S. Jangte, T. Nguyen, H. Dao, Z. Sun, and D. Ni, "Lightweight Authentication and Key Agreement Protocols for Secure Group Communication in Fog Computing," IEEE Transactions on Sustainable Computing, pp. 1-11, 2020.
14. X. Wang, Y. Liu, Y. Sun, and Z. Yu, "Lightweight Anonymous Authentication Scheme for Secure and Efficient Data Aggregation in Internet of Things," IEEE Access, vol. 6, pp. 71287-71297, 2018.
15. A. Nayak, S. Jaiswal, and N. Singh, "Lightweight Identity-Based Encryption for Secure Communication in Internet of Things," in 2019 10th International Conference on Computing, Communication, Control and Automation (C5-CCA), pp. 1-6, IEEE, 2019.
16. Abu Al‐Haija, Q., Al Badawi, A., & Bojja, G. R. (2022). Boost‐Defence for resilient IoT networks: A head‐to‐toe approach. Expert Systems, 39(10), e12934.
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.