HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

被引:0
作者
Mohamed, Nur Nabila [1 ]
Yussoff, Yusnani Mohd [2 ]
Saleh, Mohammed Ahmed [2 ]
Hashim, Habibah [2 ]
机构
[1] Mahsa Univ, Fac Engn & Built Environm, Jenjarom, Selangor, Malaysia
[2] Univ Teknol MARA, Fac Elect Engn, Shah Alam, Malaysia
来源
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA | 2020年 / 19卷 / 03期
关键词
Cryptography; Internet of things; encryption; public key cryptography; security; AUTHENTICATION SCHEME; ENCRYPTION DESIGN; SECURE DATA; LIGHTWEIGHT; ALGORITHM; IMPLEMENTATION; COMMUNICATION; CRYPTOSYSTEM; SYSTEM; AES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013 to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.
引用
收藏
页码:279 / 319
页数:41
相关论文
共 50 条
  • [21] A Lightweight Cryptographic Framework Based on Hybrid Cellular Automata for IoT Applications
    Hasan, Abrar
    Hashem, M. M. A.
    IEEE ACCESS, 2024, 12 : 192672 - 192688
  • [22] A hybrid fog-cloud approach for securing the Internet of Things
    Rajaputhri Maharaja
    Prashant Iyer
    Zilong Ye
    Cluster Computing, 2020, 23 : 451 - 459
  • [23] A hybrid fog-cloud approach for securing the Internet of Things
    Maharaja, Rajaputhri
    Iyer, Prashant
    Ye, Zilong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 451 - 459
  • [24] Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities
    Bhuiyan, Mohammad Nuruzzaman
    Rahman, Md Mahbubur
    Billah, Md Masum
    Saha, Dipanita
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10474 - 10498
  • [25] A DYNAMIC PACKING APPROACH FOR INTERNET-OF-THINGS AND LOGISTICS APPLICATIONS
    Eliiyi, Ugur
    Nasibov, Efendi
    TWMS JOURNAL OF PURE AND APPLIED MATHEMATICS, 2023, 14 (01): : 69 - 90
  • [26] Internet of multimedia things (IoMT): A review
    Laghari, Asif Ali
    Li, Hang
    Karim, Shahid
    Hyder, Waheeduddin
    Shoulin, Yin
    Khan, Abdullah Ayub
    Laghari, Rashid Ali
    REVIEW OF SOCIONETWORK STRATEGIES, 2025, 19 (01) : 19 - 47
  • [27] The Internet of Robotic Things: A review of concept, added value and applications
    Simoens, Pieter
    Dragone, Mauro
    Saffiotti, Alessandro
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2018, 15 (01):
  • [28] A Hybrid Approach for Data Analytics for Internet of Things
    Alturki, Badraddin
    Reiff-Marganiec, Stephan
    Perera, Charith
    IOT'17: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS, 2017, : 48 - 55
  • [29] Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 2033 - 2051
  • [30] Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things
    Al-Aqrabi, Hussain
    Johnson, Anju P.
    Hill, Richard
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 21 - 28