Lightweight Cryptography in IIoT the Internet of Things in the Industrial Field

被引:0
作者
Eterovic, Jorge [1 ]
Cipriano, Marcelo [1 ]
Garcia, Edith [1 ]
Torres, Luis [1 ]
机构
[1] Univ Salvador, Vice Rectorado Invest & Desarrollo, Fac Ingn, Inst Invest Ciencia & Tecnol, Lavalle 1854 C1051 AAB, Buenos Aires, DF, Argentina
来源
COMPUTER SCIENCE - CACIC 2019 | 2020年 / 1184卷
关键词
Lightweight Cryptography; Internet of Things; IoT; Industrial Internet of Things; IIoT; Lightweight cryptosystems; CORRELATION ATTACK; PRACTICAL ATTACK; CRYPTANALYSIS; CIPHER;
D O I
10.1007/978-3-030-48325-8_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Lightweight Cryptography is one of the current topics of Cryptology. A great variety of "lightweight" algorithms have been designed to guarantee Confidentiality, Authenticity and Integrity of data in devices of what it is known as the Internet of Things (IoT). Some of them arise from the academic field and are applied in the Industry, while some others are proprietary, developed by companies to achieve their security requirements. This paper presents the state of the art of some of these algorithms used in different IIoT devices. Their general cryptological features are briefly described, as well as the different attacks to which they were subjected. Finally, new trends for the design and implementation of lightweight algorithms are listed.
引用
收藏
页码:335 / 353
页数:19
相关论文
共 42 条
[1]  
Anderson R., 1994, UK telecom (Usenet)June
[2]  
[Anonymous], 2017, About us
[3]  
[Anonymous], 2011, Report 2011/499
[4]  
[Anonymous], 2011, SYMM KEY ENCR WORKSH
[5]   Instant ciphertext-only cryptanalysis of GSM encrypted communication [J].
Barkan, Elad ;
Biham, Eli ;
Keller, Nathan .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :392-429
[6]   A study of the DVD content scrambling system (CSS) algorithm [J].
Becker, M ;
Desoky, A .
Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004, :353-356
[7]  
Biryukov A., 2013, SAC 2012, V7707, P86, DOI [10.1007/978-3-642-35999-67, DOI 10.1007/978-3-642-35999-67]
[8]  
Biryukov A, 2011, LECT NOTES COMPUT SC, V6715, P91, DOI 10.1007/978-3-642-21554-4_6
[9]  
Bono SC, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P1
[10]  
Borghoff J, 2009, LECT NOTES COMPUT SC, V5677, P250, DOI 10.1007/978-3-642-03356-8_15