Symmetric and Asymmetric Encryption Schemes for Internet of Things: A Survey

Authors

  • Nusrat H. Shah Department of Computer Science and Information Technology, Jazan University, KSA https://orcid.org/0000-0003-2614-7644
  • Durdana T. Khan Department of Computer Science and Information Technology, Jazan University, KSA
  • Arshia A. Banu Department of Computer Science and Information Technology, Jazan University, KSA
  • Lubna H. Shah CBA, Jazan University, KSA

Keywords:

Internet of Things, Authentication, PKC, ECC

Abstract

IoT applications such as smart homes can monitor and control users' household chores anytime and anywhere. Similarly, Body Area Networks (BANs) can monitor the physical condition of a patient via various wearable sensors. Several authentication protocols have been proposed for embedded devices based on hash chains, symmetric cryptography, or PKC (public-key cryptography). Nevertheless, approaches based on hash chains and symmetric cryptography require storing large amounts of data regarding user identities and equivalent symmetric ECC keys with an increase in the number of devices. More seriously, updating a user's key and establishing a session key in such a protocol is a complex task. The various key authentication protocol for internet of things are reviewed in this paper. The major techniques which are already been proposed are focused on the complexity of the authentication model.

Downloads

Download data is not yet available.

References

N. Druml et al., "A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems," 2014 17th Euromicro Conference on Digital System Design, 2014, pp. 372-378

S. Garg, K. Kaur, G. Kaddoum, S. H. Ahmed, F. Gagnon and M. Guizani, "ECC-based Secure and Lightweight Authentication Protocol for Mobile Environment," IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2019, pp. 1-6

S. Khan and R. K. Aggarwal, "Efficient Mutual Authentication mechanism to Secure Internet of Things (IoT)," 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 2019, pp. 409-412

S. Shamshad, K. Mahmood, S. Kumari and M. K. Khan, "Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”," in IEEE Systems Journal, vol. 15, no. 1, pp. 877-880, March 2021

U. Satapathy, B. K. Mohanta, D. Jena and S. Sobhanayak, "An ECC based Lightweight Authentication Protocol For Mobile Phone in Smart Home," 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS), 2018, pp. 303-308

E. Lara, L. Aguilar and J. A. García, "Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications," in IEEE Access, vol. 9, pp. 79196-79213, 2021

B. AMOR, M. ABID and A. MEDDEB, "SAMAFog: Service-Aware Mutual Authentication Fog-based Protocol," 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019, pp. 1049-1054

G. Shen and B. Liu, "Research on Embedding ECC into RFID Authentication Protocol," 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 1835-1838

M. K. Gupta, R. Kumar and S. Kumari, "Flaws and Amendment in an ECC-based Authentication Scheme for SIP," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 372-376

S. Garg, K. Kaur, G. Kaddoum and M. Client, "ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020, pp. 1-6

H. Debiao, C. Jianhua, and H. Jin, “An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security,” Information Fusion, vol. 13, no. 3, pp. 223–230, 2012.

R. A. Goutham, G.-J. Lee, and K.-Y. Yoo, “An anonymous id-based remote mutual authentication with key agreement protocol on ecc using smart cards,” in Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, 2015, pp. 169–174.

Aakanksha Tewari, B. B. Gupta, “A robust anonymity preserving authentication protocol for IoT devices”, 2018, IEEE International Conference on Consumer Electronics (ICCE)

Manasha Saqib, Bhat Jasra, Ayaz Hassan Moon, “A lightweight three factor authentication framework for IoT based critical applications”, 2021, Journal of King Saud University - Computer and Information Sciences

Vidya Rao, Prema K. V., “Lightweight Authentication and Data Encryption Scheme for IoT Applications”, 2020, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)

UtkalikaSatapathy, Bhabendu Kumar Mohanta, Debsish Jena, SrichandanSobhanayak, “An ECC based Lightweight Authentication ProtocolFor Mobile Phone in Smart Home”, 2018, IEEE 13th International Conference on Industrial and Information Systems (ICIIS)

Sahil Garg, Kuljeet Kaur, Georges Kaddoum, Kim-Kwang Raymond Choo, “Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0”, 2020, IEEE Internet of Things Journal

Sarmadullah Khan, Ahmed Ibrahim Alzahrani, Osama Alfarraj, Nasser Alalwan, Ali H. Al-Bayatti, “Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices”, 2019, IEEE Access

Xuyang Ding, Xiaoxiang Wang, Ying Xie, Fagen Li, “A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things”, 2021, IEEE Internet of Things Journal

Chau D. M. Pham, Tran Khanh Dang, “A lightweight authentication protocol for D2D-enabled IoT systems with privacy”, 2021, Pervasive and Mobile Computing

Syed Wajid Ali Shah, Naeem Firdous Syed, ArashShaghaghi, Adnan Anwar, Zubair Baig, Robin Doss, “Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication”, 2020, IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Bahaa Hussein Taher, Sheng Jiang, Ali A. Yassin, Hongwei Lu, “Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction”, 2019, IEEE Access

Fadi Farha, Huansheng Ning, Karim Ali, Liming Chen, Christopher Nugent, “SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices”, 2021, IEEE Internet of Things Journal

Tarek A. Idriss, Haytham A. Idriss, Magdy A. Bayoumi, “A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices”, 2021, IEEE Access

Karim Lounis, Mohammad Zulkernine, “T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT”, 2019, IEEE Access

HüsnüYıldız, Murat Cenk, ErtanOnur, “PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol”, 2021, IEEE Internet of Things Journal

Konstantinos Goutsos, Alex Bystrov, “Lightweight PUF-based Continuous Authentication Protocol”, 2019, International Conference on Computing, Electronics & Communications Engineering (iCCECE)

Percentage of Data Sharing

Downloads

Published

16.01.2023

How to Cite

H. Shah, N. ., T. Khan, D. ., A. Banu, A. ., & H. Shah, L. . (2023). Symmetric and Asymmetric Encryption Schemes for Internet of Things: A Survey . International Journal of Intelligent Systems and Applications in Engineering, 11(1), 254–260. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2465

Issue

Section

Research Article