HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

被引:0
作者
Mohamed, Nur Nabila [1 ]
Yussoff, Yusnani Mohd [2 ]
Saleh, Mohammed Ahmed [2 ]
Hashim, Habibah [2 ]
机构
[1] Mahsa Univ, Fac Engn & Built Environm, Jenjarom, Selangor, Malaysia
[2] Univ Teknol MARA, Fac Elect Engn, Shah Alam, Malaysia
来源
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA | 2020年 / 19卷 / 03期
关键词
Cryptography; Internet of things; encryption; public key cryptography; security; AUTHENTICATION SCHEME; ENCRYPTION DESIGN; SECURE DATA; LIGHTWEIGHT; ALGORITHM; IMPLEMENTATION; COMMUNICATION; CRYPTOSYSTEM; SYSTEM; AES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013 to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.
引用
收藏
页码:279 / 319
页数:41
相关论文
共 50 条
  • [41] A review on evolving domains of Internet of Things: Architecture, applications, and technical challenges
    Sharma, Jahanvi
    Sangwan, Anju
    Singh, Rishi Pal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (18)
  • [42] A Hybrid Approach for Seamless and Interoperable Communication in the Internet of Things
    Khan, Rahim
    Ali, Ihsan
    Jan, Mian A.
    Zakarya, Muhammad
    Khan, Muazzam A.
    Alshamrani, Sultan S.
    Guizani, Mohsen
    IEEE NETWORK, 2021, 35 (06): : 202 - 208
  • [43] Low Latency, Area and Optimal Power Hybrid Lightweight Cryptography Authentication Scheme for Internet of Things Applications
    P. Prakasam
    M. Madheswaran
    K. P. Sujith
    Md Shohel Sayeed
    Wireless Personal Communications, 2022, 126 : 351 - 365
  • [44] A New Hybrid Fault Tolerance Approach for Internet of Things
    Cheraghlou, Mehdi Nazari
    Khadem-Zadeh, Ahmad
    Haghparast, Majid
    ELECTRONICS, 2019, 8 (05)
  • [45] Internet of Things 2.0: Concepts, Applications, and Future Directions
    Zhou, Ian
    Makhdoom, Imran
    Shariati, Negin
    Raza, Muhammad Ahmad
    Keshavarz, Rasool
    Lipman, Justin
    Abolhasan, Mehran
    Jamalipour, Abbas
    IEEE ACCESS, 2021, 9 : 70961 - 71012
  • [46] A hybrid architecture for resolving Cryptographic issues in internet of things (IoT), Employing Quantum computing supremacy
    Shamshad, Shuhab
    Riaz, Farina
    Riaz, Rabia
    Rizvi, Sanam Shahla
    Abdulla, Shahab
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 271 - 276
  • [47] Clinical Perspective on Internet of Things Applications for Care of the Elderly
    Tun, Soe Ye Yint
    Madanian, Samaneh
    Parry, Dave
    ELECTRONICS, 2020, 9 (11) : 1 - 28
  • [48] Security in Internet of Things: A Review
    Khan, Naqash Azeem
    Awang, Azlan
    Karim, Samsul Ariffin Abdul
    IEEE ACCESS, 2022, 10 : 104649 - 104670
  • [49] Security Review On The Internet of Things
    Whitter-Jones, Jack
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 163 - 168
  • [50] Internet of Things Forensics: A Review
    Atlam, Hany F.
    Hemdan, Ezz El-Din
    Alenezi, Ahmed
    Alassafi, Madini O.
    Wills, Gary B.
    INTERNET OF THINGS, 2020, 11