HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

被引:0
作者
Mohamed, Nur Nabila [1 ]
Yussoff, Yusnani Mohd [2 ]
Saleh, Mohammed Ahmed [2 ]
Hashim, Habibah [2 ]
机构
[1] Mahsa Univ, Fac Engn & Built Environm, Jenjarom, Selangor, Malaysia
[2] Univ Teknol MARA, Fac Elect Engn, Shah Alam, Malaysia
来源
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA | 2020年 / 19卷 / 03期
关键词
Cryptography; Internet of things; encryption; public key cryptography; security; AUTHENTICATION SCHEME; ENCRYPTION DESIGN; SECURE DATA; LIGHTWEIGHT; ALGORITHM; IMPLEMENTATION; COMMUNICATION; CRYPTOSYSTEM; SYSTEM; AES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013 to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.
引用
收藏
页码:279 / 319
页数:41
相关论文
共 50 条
  • [31] Internet of things: Vision, applications and research challenges
    Miorandi, Daniele
    Sicari, Sabrina
    De Pellegrini, Francesco
    Chlamtac, Imrich
    AD HOC NETWORKS, 2012, 10 (07) : 1497 - 1516
  • [32] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [33] Low Latency, Area and Optimal Power Hybrid Lightweight Cryptography Authentication Scheme for Internet of Things Applications
    Prakasam, P.
    Madheswaran, M.
    Sujith, K. P.
    Sayeed, Md Shohel
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (01) : 351 - 365
  • [34] XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications
    Aydin, Omer
    Kosemen, Cem
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2020, 26 (05): : 953 - 958
  • [35] A flexible encryption technique for the internet of things environment
    Medileh, Saci
    Laouid, Abdelkader
    Nagoudi, El Moatez Billah
    Euler, Reinhardt
    Bounceur, Ahcene
    Hammoudeh, Mohammad
    AlShaikh, Muath
    Eleyan, Amna
    Khashan, Osama Ahmed
    AD HOC NETWORKS, 2020, 106
  • [36] Internet of things in health management systems: A review
    Huang, Jinbo
    Wu, Xianjun
    Huang, Wendong
    Wu, Xiaoli
    Wang, S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (04)
  • [37] Review on Security of Internet of Things Authentication Mechanism
    Nandy, Tarak
    Bin Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Kiah, Miss Laiha Mat
    Lun, Lau Sian
    Juma'at, Nor Badrul Annuar
    Ahmedy, Ismail
    Ghani, Norjihan Abdul
    Bhattacharyya, Sananda
    IEEE ACCESS, 2019, 7 : 151054 - 151089
  • [38] A Review on Internet of Things for Defense and Public Safety
    Fraga-Lamas, Paula
    Fernandez-Carames, Tiago M.
    Suarez-Albela, Manuel
    Castedo, Luis
    Gonzalez-Lopez, Miguel
    SENSORS, 2016, 16 (10)
  • [39] Service composition approaches for internet of things: a review
    Aoudia, Idir
    Benharzallah, Saber
    Kahloul, Laid
    Kazar, Okba
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (02) : 194 - 230
  • [40] The Extreme Edge at the Bottom of the Internet of Things: A Review
    Portilla, Jorge
    Mujica, Gabriel
    Lee, Jin-Shyan
    Riesgo, Teresa
    IEEE SENSORS JOURNAL, 2019, 19 (09) : 3179 - 3190