HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

被引:0
作者
Mohamed, Nur Nabila [1 ]
Yussoff, Yusnani Mohd [2 ]
Saleh, Mohammed Ahmed [2 ]
Hashim, Habibah [2 ]
机构
[1] Mahsa Univ, Fac Engn & Built Environm, Jenjarom, Selangor, Malaysia
[2] Univ Teknol MARA, Fac Elect Engn, Shah Alam, Malaysia
来源
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA | 2020年 / 19卷 / 03期
关键词
Cryptography; Internet of things; encryption; public key cryptography; security; AUTHENTICATION SCHEME; ENCRYPTION DESIGN; SECURE DATA; LIGHTWEIGHT; ALGORITHM; IMPLEMENTATION; COMMUNICATION; CRYPTOSYSTEM; SYSTEM; AES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013 to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.
引用
收藏
页码:279 / 319
页数:41
相关论文
共 50 条
  • [11] The applications of Internet of Things (IoT) in industrial management: a science mapping review
    Mu, Xiaoshao
    Antwi-Afari, Maxwell Fordjour
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2023, 62 (05) : 1928 - 1952
  • [12] A Structured Approach for Describing Healthcare Applications for The Internet of Things
    Laplante, Phillip A.
    Laplante, Nancy L.
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 621 - 625
  • [13] Blockchain applications for the Internet of Things: Systematic review and challenges
    Qureshi, Junaid Nasir
    Farooq, Muhammad Shoaib
    Abid, Adnan
    Umer, Tariq
    Bashir, Ali Kashif
    Bin Zikria, Yousaf
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 94
  • [14] A Comprehensive Review on Internet of Things Applications in Power Systems
    Majhi, Abhilash Asit Kumar
    Mohanty, Sanjeeb
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34896 - 34923
  • [15] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    Wireless Networks, 2021, 27 : 1515 - 1555
  • [16] Internet of Things applications: A systematic review
    Asghari, Parvaneh
    Rahmani, Amir Masoud
    Javadi, Hamid Haj Seyyed
    COMPUTER NETWORKS, 2019, 148 : 241 - 261
  • [17] INTERNET OF THINGS: A REVIEW OF APPLICATIONS AND TECHNOLOGIES
    Vongsingthong, Suwimon
    Smanchat, Sucha
    SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2014, 21 (04): : 359 - 374
  • [18] A Hybrid Chaotic Encryption ASIC With Dynamic Precision for Internet of Things
    Feng, Jundong
    Wang, Junchao
    Zhu, Yubin
    Han, Kaining
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1148 - 1163
  • [19] Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status
    Imam, Raza
    Areeb, Qazi Mohammad
    Alturki, Abdulrahman
    Anwer, Faisal
    IEEE ACCESS, 2021, 9 : 155949 - 155976
  • [20] Applications of Internet of Things
    Chen, Chi-Hua
    Lo, Kuen-Rong
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2018, 7 (09)