A Novel Lightweight Algorithm for IoT Data in Cold Chain Applications
Keywords:
Lightweight Cryptography, Dynamic S-Box, IoT, Security, ColdChainAbstract
Supply Chain Management (SCM) involves the coordination and management of various interconnected activities and processes across different organizations and functions within a supply chain. Effective supply chain management activities depend on extensive data handling, continuous tracking and monitoring, and reliable business transactions. There are several fundamental issues in supply chain management, particularly in temperature-controlled supply chains or "cold chain networks." Environment-related factors like temperature and humidity levels can have an impact on the supply chain's operational or business environment. The integrity and auditability of the supply chain may be impacted by security risks in the cold chain network. For cold-chain applications, our suggested architecture offers data in real-time gathering at the user-end, and secure communications. To address the concern of secure transactions within the supply chain management entities, our proposed architecture employs a novel dynamic key dependent cryptographic algorithm. The integrity of the sensor data gathered by the IoT devices are guaranteed by this method. By using cryptographic techniques, the architecture provides a secure and tamper-resistant communication channel for transmitting the sensor data to the cloud. Encryption of IoT data using these algorithms can contribute to the secure transmission of data of cold chain applications. The performance analysis has been done on average encryption time, decryption time, throughput, and memory consumption.
Downloads
References
G. Richey, A. S. Roath, F. G. Adams, and A. Wieland, “A Responsiveness View of logistics and supply chain management,” J. Bus. Logist., 2021.
H. Birkel and J. M. Müller, “Potentials of industry 4.0 for supply chain management within the triple bottom line of sustainability – A systematic literature review,” J. Clean. Prod., vol. 289, no. 125612, p. 125612, 2021
S. Mercier, M. Mondor, U. McCarthy, S. Villeneuve, G. Alvarez, and I. Uysal, “Optimized cold chain to save food,” in Saving Food, Elsevier, 2019, pp. 203–226.
Yudi Fernando, Ming-Lang Tseng, Ika Sari Wahyuni-Td, Ana Beatriz Lopes de Sousa Jabbour, Charbel Jose Chiappetta Jabbour & Cyril Foropon (2023) Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia, Journal of Industrial and Production Engineering, 40:2, 102-116.
Gillespie, J., da Costa, T. P., Cama-Moncunill, X., Cadden, T., Condell, J., Cowderoy, T., ... & Ramanathan, R. (2023). Real-Time Anomaly Detection in Cold Chain Transportation Using IoT Technology. Sustainability, 15(3), 2255.
V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," in IEEE Access, vol. 9, pp. 28177-28193, 2021.
Dwivedi, A. D., & Srivastava, G. (2023). Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK. Internet of Things, 100677.
Muhalhal, L. A., & Alshawi, I. S. (2023). A hybrid modified lightweight algorithm for achieving data integrity and confidentiality. International Journal of Electrical and Computer Engineering (IJECE), 13(1), 833-841.
El-Hajj, M., Mousawi, H., & Fadlallah, A. (2023). Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet, 15(2), 54.
To’xtajon, Q. (2023). LIGHTWEIGHT CRYPTOGRAPHY IN IOT NETWORKS. Innovations in Technology and Science Education, 2(10), 999-1007.
Lara-Nino, C. A., Diaz-Perez, A., & Morales-Sandoval, M. (2018, October). Fpga-based assessment of midori and gift lightweight block ciphers. In Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (pp. 745-755). Cham: Springer International Publishing.
Xiao, L., Xu, H., Zhu, F., Wang, R., & Li, P. (2020). SKINNY-based RFID lightweight authentication protocol. Sensors, 20(5), 1366.
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2014). RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Cryptology ePrint Archive.
Mishra, R., Okade, M., & Mahapatra, K. (2023). Novel substitution box architectural synthesis for lightweight block ciphers. IEEE Embedded Systems Letters.
Kumar, A., Singh, P., Patro, K. A. K., & Acharya, B. (2023). High-throughput and area-efficient architectures for image encryption using PRINCE cipher. Integration, 90, 224-235.
Chauhan, J. A., Patel, A. R., Parikh, S., & Modi, N. (2022, November). An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications. In International Conference on Advancements in Smart Computing and Information Security (pp. 201-216). Cham: Springer Nature Switzerland.
Saba, S. J., Al-Nuaimi, B. T., & Suhail, R. A. (2023, March). A review of traditional, lightweight and ultra-lightweight cryptography techniques for IoT security environment. In AIP Conference Proceedings (Vol. 2475, No. 1). AIP Publishing.
Chatterjee, K., Chaudhary, R. R. K., & Singh, A. (2022). A lightweight block cipher technique for IoT based E-healthcare system security. Multimedia Tools and Applications, 1-30.
Nayancy, Dutta, S., & Chakraborty, S. (2022). A survey on implementation of lightweight block ciphers for resource constraints devices. Journal of Discrete Mathematical Sciences and Cryptography, 25(5), 1377-1398.
Xiao, H., Wang, L., & Chang, J. (2022). The differential fault analysis on block cipher FeW. Cybersecurity, 5(1), 28.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.