Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices
In the past years, the Internet of Things (IoT) used in different applications and very wide range of fields (e.g. cloud services, smart environments, logistics, social and personal domains, and healthcare services). The IoT included a variety of components and devices such as RFID devices, wireless sensors, actuators, and wireless networks. Also, the IoT with smart devices adopted in various companies, organizations and public services systems. For instance, some devices like Notebooks and smartphones have been used to perform different management activities and duties. These smart devices relied on data exchange and data storage resources in clouds computing services. In this context, the saved data and exchanged data required protection against hacking operations, transferred with more secure communications channels, and safe storage environment in the clouds and local storage systems. In this paper, we proposed some encryption algorithms to tackle the issue of data confidentiality in the IoT applications. This research provided analysis and investigation of these encryption algorithms in light of components of the designs, versions of these algorithms, encryption keys, block size, round functions and the techniques used in the designs.
J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami. Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
L. Atzori, A. Iera and G. Morabito. The internet of things: A survey. Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017.
M. H. Shukur. Design a Mobile Medication Dispenser Based on IoT Technology. In: 3rd International Conference on Communication Engineering and Computer Science (CIC-COCOS’19), 2019.
Y. Yang, X. Zheng, W. Guo, X. Liu and V. Chang. Privacy-preserving fusion of IoT and big data for e-health. Future Generation Computer Systems, vol. 86, pp. 1437-1455, 2018.
S. Singh and N. Singh. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-commerce. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), IEEE, pp. 1577-1581, 2015.
M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire and P. R. M. Inácio. Challenges of securing internet of things devices: A survey. Security and Privacy, vol. 1, no. 2. e20, 2018.
Q. Jing, A. V. Vasilakos, J. Wan, J. Lu and D. Qiu. Security of the internet of things: Perspectives and challenges. Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014.
H. Shin, H. K. Lee, H. Y. Cha, S. W. Heo and H. Kim. IoT Security Issues and Light Weight Block Cipher. In: 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), IEEE, pp. 381-384, 2019
A. Alahdal and N. K. Deshmukh. A systematic technical survey of lightweight cryptography on IoT environment. International Journal of Scientific and Technology Research, vol. 9, no. 3, p. 16, 2020.
V. Thakor, M. A. Razzaque and M. R. A. Khandaker. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access, vol. 9, pp. 77-93, 2021.
P. Panahi, C. Bayılmış, U. Çavuşoğlu and S. Kaçar. Performance evaluation of lightweight encryption algorithms for IoT-based applications. Arabian Journal for Science and Engineering, vol. 46, no. 4, pp. 4015-4037, 2021.
K. F. Jasim and I. F. Al-Shaikhli. Mobile Technology Generations and Cryptographic Algorithms: Analysis Study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), IEEE, pp. 50-55, 2015.
K. F. Jasim and I. F. Al-Shaikhli. Analysis of Confidentiality Algorithms in Different Mobile Generations. In: Conference of Cihan University-Erbil on Communication Engineering and Computer Science, p. 55, 2017.
A. M. Ruby, S. M. Soliman and H. Mostafa. Dynamically Reconfigurable Resource Efficient AES Implementation for IoT Applications. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, pp. 1-5, 2020.
G. Harcha, V. Lapôtre, C. Chavet and P. Coussy. Toward Secured IoT Devices: A Shuffled 8-Bit AES Hardware Implementation. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, pp. 1-4, 2020.
K. Aggarwal. Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers. International Journal of Computers and Applications, vol. 68, no. 25, pp. 10-16, 2013.
R. E. J. Paje, A. M. Sison, R. P. Medina. 2019. Multidimensional Key RC6 Algorithm. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 19). Association for Computing Machinery, New York, USA, pp. 33-38, 2019.
A. I. Sallam, O. S. Faragallah and E. M. El-Rabaie. HEVC selective encryption using RC6 block cipher technique. IEEE Transactions on Multimedia, vol. 20, no. 7, pp. 1636-1644, 2018.
E. O. Agu, M. O. Ogar and A. O. Okwori. Formation of an improved RC6 (IRC6) cryptographic algorithm. International Journal of Advanced Research in Computer Science, vol. 10, pp. 34-39, 2019.
K. I. Santoso, M. A. Muin and M. A. Mahmudi. Implementation of AES cryptography and twofish hybrid algorithms for cloud. Journal of Physics: Conference Series, vol. 1517, no. 1, p. 012099. 2020.
V. Vatsala and T. Poongodi. Security and privacy of E-health data using two fish encryption algorithm. International Journal of Recent Technology and Engineering, vol. 9, no. 1, pp. 1906-1910, 2020.
M. Vedaraj. A hybrid data encryption technique using TWOFish and elgamal for cloud computing. International Journal of Management, Technology And Engineering, vol. 8, no. 1473, pp. 1473-1478, 2018.
K. Jang, S. Choi, H. Kwon, H. Kim, J. Park and H. Seo. Grover on Korean block ciphers. Applied Sciences, vol. 10, no. 18, p. 6407, 2020.
L. Sleem and R. Couturier. Speck-R: An ultra light-weight cryptographic scheme for Internet of things. Multimedia Tools and Applications, vol. 80, pp. 17067-17102, 2020.
ISO. ISO/IEC 29192-2: 2019: Information Security Lightweight Cryptography Part 2: Block Ciphers. Geneva, Switzerland: International Organization for Standardization, 2019.
J. Song and S. C. Seo. Efficient parallel implementation of CTR mode of ARX-based block ciphers on ARMv8 microcontrollers. Applied Sciences, vol. 11, no. 6, p. 2548, 2021.
Y. B. Kim, H. Kwon, S. W. An, H. Seo and S. C. Seo. Efficient implementation of ARX-based block ciphers on 8-Bit AVR microcontrollers. Mathematics, vol. 8, no. 10, p. 1837, 2020.
C. Manifavas, G. Hatzivasilis, K. Fysarakis and Y. Papaefstathiou. A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks, vol. 9, no. 10, pp. 1226-1246, 2016.
Ianix. ChaCha Usage and Deployment, 2021. Available from: https://www.ianix.com/pub/chacha-deployment.html. [Last accessed on 2021 May 27].
M. Coutinho and T. C. S. Neto. Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha. IACR Cryptol, p. 224, 2021.
P. McLaren, W. J. Buchanan, G. Russell and Z. Tan. Deriving ChaCha20 key streams from targeted memory analysis. Journal of Information Security and Applications, vol. 48, p. 102372, 2019.
S. M. S. Reza, A. Ayob, M. M. Arifeen, N. Amin, M. H. M. Saad and A. Hussain. A lightweight security scheme for advanced metering infrastructures in smart grid. Bulletin of Electrical Engineering and Informatics, vol. 9, no. 2, pp. 777-784, 2020.
Copyright (c) 2021 Khalid F. Jasim, Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah, Soma Solaimanzadeh
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).