TY - JOUR
T1 - Cryptography Algorithms for Enhancing IoT Security
AU - Thabit, Fursan
AU - Can, Ozgu
AU - Aljahdali, Asia Othman
AU - Al-Gaphari, Ghaleb H.
AU - Alkhzaimi, Hoda A.
N1 - Funding Information:
This study was conducted by a researcher who was a part of a Postdoctoral Research Project at the Department of Computer Engineering, Faculty of Engineering, Ege University, Izmir, Turkey. The researcher is grateful to the OWIS QARNI FOUNDATION (Yemen Pioneers Program) for their valuable assistance during the research process. The researcher would like to express gratitude to their supervisor, Assoc. Prof. Dr. Ozgu Can, for providing support throughout the research. Additionally, the researcher would also like to thank Assoc. Prof. Dr. Asia Othman Aljahdali and Dr. Hoda A. Alkhzaimi for their support in carrying out this research.
Publisher Copyright:
© 2023 Elsevier B.V.
PY - 2023/7
Y1 - 2023/7
N2 - In today's fast-paced world, a new technology paradigm known as the Internet of Things (IoT) is advancing every business. It provides communication between the digital and physical worlds, transforming the way people do business quickly. The IoT is a network of physical objects (things) equipped with sensors, intelligent networking, radio-frequency identification (RFID), and other technologies that communicate and exchange data with other systems and devices online. IoT applications are now significantly more prevalent worldwide. IoT is driving the real world to become more intelligent in several industries, including smart grids for electricity, intelligent traffic, and smart homes and buildings. As a result, predictions and research point to over 50 billion connected devices by 2020. It will be required to safeguard this growing volume of data during exchange because the amount of data being transmitted will be quite enormous. Data security is represented by cryptography, an essential tool (algorithms) in security, which is why many researchers are developing cryptographic algorithms to improve the Security of IoT. This survey paper introduced an overview of IoT technology, architecture, and applications and a detailed analysis comparing all cryptographic algorithms and their use in day-to-day life activities. This paper discusses lightweight block ciphers, stream ciphers, and hybrid ciphers. The report evaluates security algorithms, comparing performance and robustness with the computational complexity of these techniques. Finally, the survey presents IoT security challenges, threats, and attacks with their mitigation techniques.
AB - In today's fast-paced world, a new technology paradigm known as the Internet of Things (IoT) is advancing every business. It provides communication between the digital and physical worlds, transforming the way people do business quickly. The IoT is a network of physical objects (things) equipped with sensors, intelligent networking, radio-frequency identification (RFID), and other technologies that communicate and exchange data with other systems and devices online. IoT applications are now significantly more prevalent worldwide. IoT is driving the real world to become more intelligent in several industries, including smart grids for electricity, intelligent traffic, and smart homes and buildings. As a result, predictions and research point to over 50 billion connected devices by 2020. It will be required to safeguard this growing volume of data during exchange because the amount of data being transmitted will be quite enormous. Data security is represented by cryptography, an essential tool (algorithms) in security, which is why many researchers are developing cryptographic algorithms to improve the Security of IoT. This survey paper introduced an overview of IoT technology, architecture, and applications and a detailed analysis comparing all cryptographic algorithms and their use in day-to-day life activities. This paper discusses lightweight block ciphers, stream ciphers, and hybrid ciphers. The report evaluates security algorithms, comparing performance and robustness with the computational complexity of these techniques. Finally, the survey presents IoT security challenges, threats, and attacks with their mitigation techniques.
KW - Algorithm
KW - Ciphers
KW - IoT
KW - Lightweight cryptography security requirement, Threats, Attack, Mitigation techniques
KW - Privacy
KW - preservation
UR - http://www.scopus.com/inward/record.url?scp=85153057130&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85153057130&partnerID=8YFLogxK
U2 - 10.1016/j.iot.2023.100759
DO - 10.1016/j.iot.2023.100759
M3 - Article
AN - SCOPUS:85153057130
SN - 2542-6605
VL - 22
JO - Internet of Things (Netherlands)
JF - Internet of Things (Netherlands)
M1 - 100759
ER -