Abstract

Recently, Internet of Things (IoT) has opened a new horizon in the field of information technology. In this environment, the enormous number of device connection and huge volume data generation on the air is very much sensitive in various kind of attacks. Conventional cryptographic algorithms are useful for maintaining confidentiality and integrity at the time of information passing. In resource constrained environment the devices that are used, are small in size, having limited computational capability, limited memory, and very low-power batteries. Hence, conventional cryptographic algorithms are not applicable there for security purposes. This resource constrained smart devices result in the exposure of a new field called lightweight cryptography (LWC). A huge number of research solutions have been proposed for implementation of lightweight cryptographic primitives and protocols in such resource constraint domains. In this paper, a discussion has been made on lightweight cryptographic primitives that include lightweight block ciphers (PRESENT, TEA, CLEFIA), stream ciphers (GRAIN V1, TRIVIUM and MICKEY), and hash functions (PHOTON, QUARK, and SPONGENT). This paper is also including the way of maintaining security in IoT environment with the help of these primitives. Besides these, a few lightweight data protocol (MQTT, CoAP, and XMPP) strategies in IoT have also been discussed. Finally, a comparative study has been made in the discussion section considering different parameters.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.