Internet of defenseless "things". IoT encryption algorithms

I was looking for similar articles about security in Habré and other sources, but I could not find anything similar, so I wrote this review for you. Begin!





Every day the number of "things" increases. It can be like cameras that stand on the streets of Moscow, various sensors and sensors that are used in production, medical devices that monitor your health, as well as various household items (smart refrigerators, smart doors, etc.) that surround us everyday.





Some devices store very sensitive and private information. For example, a door lock system in an apartment stores the lock code number. In addition, medical systems use devices such as ECGs, smart monitors, computed tomography and many others that can directly affect important areas of people's lives.





This gives rise to the explicit problem of ensuring the security and privacy of data transmitted by "things". Unfortunately, designing a completely secure system in the IoT is not an easy task. First, because IoT systems are very heterogeneous, they consist of different devices that have different operating systems, hardware, and use different protocols. Secondly, the systems are very large-scale, they can be, both within one apartment, and spread to cities and even countries. Third, and very important in the context of this essay, many "things" have limited resources: memory, processing power and battery capacity, etc.





In this essay, we will focus on one of the most important security methods - data encryption algorithms. Let's analyze the current methods of encryption in the IoT and how they take into account the fact of limited resources of "things".





To better understand the problem, let's look at the IoT architecture, dividing it into logical layers that can interact both vertically and horizontally.





1. The level of "things"





Special features - Collection of necessary information by sensors and sensors (Little data). Remote control capability, low-power, resource-limited devices, low power consumption. 





2. The level of communication. 





Special Features - Wired and wireless data transmission. Various communication protocols. Various networks and their architectures. Interoperability of both devices between each other and devices with the cloud





3.





- Big Data, ML . . IoT . ""





 4.  





- . , IoT .





() IoT, .





. , , "" . , , . , .





:





















IoT - , , , . . ,   (Lightweight Cryptography), IoT.





NIST, - , , [4].





, . - .





. , , . IoT - , XOR . ,  





, , , , . ( AES, IoT [8])





. , . , . . , , [7].





, , .





:





, , . [6]. HLA(Hybrid Lightweight Algorythm). .





-, IoT, . : (), (), () (). [6] .





() . -, HLA , . , .





, ([9],[10],[11]) , - .





, , . 





IoT, . . 





. , . , , , IoT.





:





  1. Lightweight encryption algorithms - https://link.springer.com/article/10.1007/s12652-017-0494-4





  2. Security in the Internet of Things: A Review. International Conference on Computer Science and Electronics Engineering 





  3. IoT Security: Ongoing Challenges and Research Opportunities





  4. McKay KA, Bassham L, Turan M S, Mouha N (2016) Report on lightweight cryptography. NIST DRAFT NISTIR, pp 1–29





  5. S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, “A comparative survey of symmetric and asymmetric key cryptography,” 2014 Int. Conf. Electron. Commun. Comput. Eng. ICECCE 2014, pp. 83–93, 2014. 





  6. Saurabh Singh1 · Pradip Kumar Sharma1 · Seo Yeon Moon1 · Jong Hyuk Park. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. 





  7. C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Elliptic Curve Lightweight Cryptography: a Survey,” IEEE Access, vol. PP, no. c, pp. 1–1, 2018.





  8. James M, Kumar DS. (2016) An implementation of modified light- weight advanced encryption standard in FPGA. Proc Technol 25:582–589 





  9. Masram R, Shahare V, Abraham J, Moona R, Sinha P, Sunder G, Pophalkar S (2014a) Dynamic selection of symmetric key cryptographic algorithms for securing data based on various param eters. ArXiv preprint arXiv: 1406.6221, pp 1–8 





  10. Masram R, Shahare V, Abraham J, Moona R (2014b) Analysis and comparison of symmetric key cryptographic algorithms based on various file features. Int J Netw Sec Appl 6 (4): 43–52 





  11. McKay KA, Bassham L, Turan MS, Mouha N (2016) Report on lightweight cryptography. NIST DRAFT NISTIR, pp 1-29 












All Articles