Review Paper
Review Paper
https://doi.org/10.1007/s12652-020-02672-x
ORIGINAL RESEARCH
Received: 25 April 2020 / Accepted: 3 November 2020 / Published online: 21 November 2020
© Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract
The Internet-of-Things (IoT) is a combination of an intelligent infrastructure combined with various self-organizing devices.
These devices are used to monitor the environment and help to exchange sensitive data over the Internet without much human
interference. Such a huge network of unmanned devices are subjected to various security and privacy concern. As these
devices are battery powered and have low inbuilt resources, it is important to enable secure and resource-constrained security
solutions to secure the devices. Thereby, to address the security and privacy of these devices and the data, the authentication
plays an important role along with data integrity. Through this paper, we have analyzed the various lightweight solution
and their security threats under the authentication and data integrity of the IoT applications. From the study, it can be seen
that the major security concern of these protocols is to perform with less computation and resist to attacks like man-in-the-
middle, replay attacks, denial of service attacks, forgery and chosen-ciphertext attacks. Also, this review provides an insight
into using the Microsoft threat modeling tool used for IoT based applications.
Keywords Authentication · Data integrity · Lightweight cryptography · Internet-of-Things · Security analysis · Threat
modeling
13
Vol.:(0123456789)
8836 V. Rao, K. V. Prema
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8837
13
8838 V. Rao, K. V. Prema
Next layer is Transport layer that is concerned with end- (Lenstra and Verheul 2001). CoAP uses methods like create,
to-end message transfer. The message transfer can be either retrieve, update, and delete. Hence CoAP is divided into two
by handshaking using TCP or without a handshake like sub-layers, called messaging sub-layer and request/response
UDP. The transport layer involves segmentation, conges- sublayer. The messaging sub-layer checks for duplication
tion control, error control and flows control (Zhao 2014; and asynchronous nature of the interactions. The request-
Zhang and Qi 2014) presented in the IETF standards for response sub-layer performs REST communication. CoAP
Transmission Control Protocol (TCP) and User Datagram uses four types of messages: configurable, non-configur-
Protocol(UDP) protocols. Lastly, the Application layer able, acknowledgment and reset. The reliability of CoAP
interfaces with all the lower layers by establishing a secure is checked based on the configurable and non-configurable
connection among them. This layer uses port numbering for messages.
application addressing and most commonly used are Port MQTT: Message Queue Telemetry Transport (MQTT)
80 for Hyper Text Transmission Protocol (HTTP) and Port is a messaging protocol used in IoT based applications
22 for Secure Shell Protocol (SSH). These port helps in that were introduced by IBM at OASIS labs (Meier 2005).
establishing a process-to-process connection. IETF CoRE MQTT works based on a publish-subscribe communica-
working group have initiated a resource-constrained protocol tion model as in Fig. 4. It involves three entities, namely:
called Constrained Application Protocol (CoAP) (Farash and the publisher, the broker and the consumer. Publishers are
Sabzinejad 2014). Each resource corresponds to a universal the sources of data; brokers maintain information about the
resource identifier (URI) that helps the resource to oper- topics sent by publishers and consumers are the one who
ate statelessly using GET, PUT, POST, DELETE and so subscribes the topic managed by the broker. Here, the pub-
on. Other than CoAP, the application layer uses Hypertext lisher is not aware of consumers and the broker indepen-
Transfer Protocol (HTTP), which uses the request-response dently provides information to consumer’s requests. MQTT
model and URI to identify the resources. Message Queu- is built over TCP protocol and has applications in health-
ing Telemetry Transport (MQTT), Extensible Messaging care monitoring, energy meter, Facebook notifications etc,.
and Presence Protocol (XMPP), Data Distribution Service XMPP: Extensible Messaging and Presence Protocol
(DSS) and Advanced Message Queuing Protocol (AMQP) is (XMPP) (Jing et al. 2014) is an instant messaging (IM)
commonly used application layer protocol (Mahmoud et al. standard by IETF. XMPP is used basically for multi-party
2015). Some of the commonly used protocols are explained chatting, voice-video calling. This was initially developed
bellow: by Jabber open-source community to aid and spam-free,
CoAP: Constrained Application Protocol (CoAP) is an secured and decentralized protocol for IM services. XMPP
application layer protocol that defined on Representational uses XMP stanza to connect either between client-to-server.
State Transfer (REST) protocol above HTTP protocol func- Each stanza represents a piece of code that has three parts:
tionalities. REST used Request-Response model as shown in message, presence and ID. Where the message stanza speaks
Fig. 3, where a client-request-message is sent to the server about the source and destination address, the presence stanza
and the server prepares a response and returns the response shows update status and identity (ID) stanza pairs message
to the client. This communication is similar to the client/ with the respective receiver and sender.
server model. REST is a stateless communication model HTTP: World Wide Web (WWW) founded an application
and each request-reply messages are independent of each layer protocol called Hypertext Transfer Protocol (HTTP)
other. Unlike REST, CoAP uses a connectionless protocol (Jing et al. 2014) that could interface with lower-layer proto-
like UDP for message exchange and has customized HTTP cols. HTTP works under a request-response communication
functionalities for resource-constrained devices of IoT
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8839
4.2 Smart cities
4 Domain specific applications
Similar to smart-homes, every country is installing its cit-
IoT poses a diverse set of applications in various domains ies with intelligent and self-adaptive smart systems that are
that include cities, environment, energy systems, retail, man- coupled with sensors, actuation units and Internet-based
ufacturing, health and logistics (Vermesan and Friess 2014). cloud services (Jing et al. 2014). We can see smart city
This versatility has created opportunities for hardware manu- applications in smart street lighting that help in automatic
facturers, application developers and the Internet Service operation of street light based on light intensity (Tan et al.
Providers (ISP). Gartner has estimated that by the end of 2016). Likewise, smart parking is another application that
2020, the cost spent on IoT hardware will reach almost to helps drivers to park their car efficiently by saving time in
$3 trillion with the expected data flow of about 45% more searching for an empty parking slot. Smart sensors are also
than current. Beyond these predictions, the applications of used in understanding the road quality and structural health
IoT in health care has taken a share of about 40% and fol- monitoring by implanting sensors on the road and building
low the manufacturing industry with 33%. The smart grid to get a regular interval of information of road and building
technology (Chung et al. 2016; Zhao et al. 2014) posses 7% stress data (Tan et al. 2016). Lastly, IoT is used in surveil-
of total market share. Agriculture, urban infrastructure, secu- lance and emergency response in case of any environmental
rity and resource extraction has taken 4% each. Lastly, IoT disaster with-in the city (Camtepe and Yener 2004).
application in vehicle and retail takes a share of 3% and 1%,
respectively as in Fig. 5. With such a progression of applica- 4.3 Environment and agriculture
tions, we can see some of the domain-specific applications
(Hafsa Tahir and Junaid 2016). Monitoring weather conditions is an important task to
analyze the temperature, humidity, air particles, etc., in
4.1 Home automation the atmosphere. IoT has taken its place in environmental
monitoring by developing weather monitoring systems like
A smart home has become popular for two reasons. Firstly, AirPi. AirPi is capable of monitoring temperature, humid-
the involvement of a wireless sensor network in sensing and ity, smoke, UV level, carbon dioxide(CO2 ), carbon mon-
actuating has made life more comfortable. Secondly, safe- oxide (CO), nitrogen dioxide NO2 and air pressure. Other
guarding home and house-hold things have become easier than weather monitoring stations, IoT used in air pollution
(Mahmoud et al. 2015). In the smart home, we can see appli- monitoring where harmful gases like CO2, CO, NO2 and NO
cations like smart lighting, smart appliance, home intrusion are monitored and the results are presented to the admin-
detection, smoke/gas detector etc. In such applications, many istrator (Mahmoud et al. 2015; Le et al. 2009). IoT is also
sensors and actuators are attached to each device inside the used in noise pollution monitoring, Forest fire detection and
home and are controlled by the user through the Internet river flood detection. Monitoring weather conditions and air
using smartphones or web pages (Jing et al. 2014). quality helps in improving agricultural production. Smart
13
8840 V. Rao, K. V. Prema
4.4 Smart grid
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8841
All IoT devices are enabled with sensors that record the
Fig. 7 IoT layers based attacks data from the physical environment and communicate the
information over the Internet. As the Internet is an open
domain, attackers can easily damage the information under
data, user authentication, software vulnerability, intellectual the following categories (Conti et al. 2016; Stallings 2006;
property. McAndrew 2016a):
13
8842 V. Rao, K. V. Prema
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8843
the embedded system. But the use of a fixed elliptic curve composed of IoT devices, independently of communica-
can be challenged on intensive crypt-analysis. Wang and tion protocols.
Cheng (2017) made a study on using a fixed prime field to A simple block-cipher-based message authentication
build a crypto-system for applications developed for dif- encryption scheme is proposed by Mazumder et al. (2017).
ferent processors varying from 8- to 256-bits. The system takes variable message size as input along with
To address the usage of the static curve in ECC, Wang the initial vector (IV). The use of nonce and associated data
et al. (2018) proposed a dynamic elliptic curve based on is replaced with the concept of IV to reduce the overhead
Internet-of-Vehicular (IoV) network. Their work showed incurred due to nonce. A block-cipher based compression
good computational efficiency and security for a smaller function is used with the OFB model of encryption as the
key size. But storing the elliptic curves as a plain text in system encrypts variable size of data, padding of the mes-
embedded systems would lead to security concerns. To sage is removed, which reduces communication overhead.
address the data integrity issue of Java card-based appli- But the entire work is studied under serial communication of
cation, Gayoso Martínez et al. (2011) initiated the use of the participants, which is not feasible for IoT based applica-
ECC based encryption algorithm called an elliptic curve tions where each device can communicate parallel to each
integrated encryption scheme (ECIES) and concluded other or/and the base station.
that ECIES based encryption is best among encryption Shivraj et al. (2015) have proposed a one-time password
schemes for resource-constrained devices. authentication scheme based on ECC for IoT. They have
Lin et al. (2018) proposed a two-tier device-based handled the end-to-end authentication of devices and their
authentication protocol for primary user emulation attack application. As these end devices have dynamic topology
(PUEA) for IoT applications. Their work used a spectrum and non-standardized framework has led the security con-
management method to guard against common types of cern of IoT devices and applications; hence a two-layered
security threats. They have proposed that the work can be authentication is proposed. They have used lightweight iden-
extended to movable objects based on the detection per- tity based elliptic curve cryptography with Lamports OTP
formance to increase the reliability of the protocol. Tiwari algorithm with smaller key size and limited infrastructures.
and Kim (2018) have used Deoxyribonucleic acid (DNA) When compared with existing schemes like Hashable OTP
and ECC to provide double folded security for mobile and (HOPT), Time based OPT (TOTP), Bicakai OTP (BOTP)
cloud-based applications. They have used Kobliz’s algo- methods, their proposed scheme reduced the storage over-
rithm to choose the elliptic curve and compared the results head on the devices as past keys were not being stored.
with RSA based schemes. For the vehicular network, providing PKI based security
Uninterrupted and accurate functioning of IoT devices is difficult. Tan et al. (2016) has proposed a secure authenti-
in smart city applications is a crucial task. Such applica- cation key management protocol that maintains a list of keys
tions have major challenges to ensure the authenticity of bonded to the entitys identities. These entities can either
devices so as to make better decisions. Hence to balance placed on road-side or vehicles. SA-KMP used 3D-matrix
the performance between efficiency and communication based key agreement scheme with symmetric encryption.
cost, Li et al. (2017) have designed a lightweight mutual The use of symmetric encryption has reduced the high com-
authentication protocol based on public-key encryption putational cost and the performance is analyzed in terms
scheme for smart city applications. They have evaluated of transmission and storage overhead, network latency and
their work on a Contiki OS and CC2538 evaluation model. key generation time. They have used ProVerif tool to prove
The encryption process was performed offline and then the the method under Dolev and Yao mode to check the system
ciphertext was subjected to an authentication process that against DOS, collision attack and wide range of malicious
was done online. This online and offline process of the attacks. Through numerical analysis, the SA-KMP scheme
digital signature consumed more time and created over- has shown good efficiency and scalability than the existing
head on the node’s resources. Parrilla et al. (2018) had certificate-based PKI schemes.
designed a compact crypto co-processor for FPGA based To handle the overhead that occurred due to runtime,
IoT devices. This co-processor uses elliptic curve cryptog- firmware size, communication and energy consumption
raphy (ECC) with advance encryption standard (AES) and on an ARM-based device, Mössinger et al. (2016) has pro-
group keys. The proposed processor ensures the security posed ECC based signature scheme. They have considered
of wireless sensor networks independent of the communi- Secp192r curve parameters with 192-bits key length. The
cations protocols used. The crypto-processor is named as work provides proof against message integrity via cryptog-
ECC163AES128 as it can handle symmetric cipher with raphy that is greater than the cost of encryption. They have
128-bits and ECC cryptography over GF(2163) binary found that the amount of sending unsigned messages cre-
filed. The developed crypto-processor provides the secu- ated two-third of overhead that the cryptographic operation
rity of heterogeneous local Wireless Sensor Networks against the signed message. The work was simulated using
13
8844 V. Rao, K. V. Prema
Contiki OS through which they have shown the performance A review of ECIES is done by Bernstein et al. (2013).
of additional 200 ms of the runtime. The ECIES use both symmetric and asymmetric cryptogra-
The most commonly used communication medium in phy that provides double-level security. The analysis is done
healthcare is RFID. Basically, RFID based security scheme on the Java Card and the performance evaluation has con-
uses either a hash function or symmetric key encryption. cluded that encryption using ECIES is best. Based on card
Zhao has analyzed the method proposed by Liao and Hsiao shuffling-logic, a data confidentiality algorithm is designed
and found that the private keys stored, are easily hacked. using ECC by Rahaman (2017). The use of random card
Hence to overcome the private key compromise attack, shuffling has exhibited double encryption and increased the
an authentication protocol for Healthcare Environments security of the scheme. In this work, they have removed the
Using Elliptic Curve Cryptosystem is proposed by Zhao mapping process of every alphabet to corresponding ASCII
(2014). Through security analysis, the proposed scheme has values of the plain text to be paired up. The algorithm can
shown better performance than Liao and Hsiaos method. encrypt or decrypt any ASCII value-based input. The use of
Le et al. (2009) has presented a public key-based access ECC has proved that the algorithm is suitable for resource-
control mechanism using ECC. The work is compared with constrained devices.
HBQ and symmetric key encryption and uses online KDC. The integration of IoT and cloud has taken a major share
Through the result analysis, its been proven that their work in the communication industry. As the IoT infrastructure
has shown resistance to a drawback of the HBQ scheme. needs to combine with cloud, the existing infrastructures
But the use of online KDC has led to the issue of network exhibit difficulty in ensuring distributed computing. A
breakdown in case the Internet goes down. Internet Protocol/Multiprotocol label switching (IP/MPLS)
For automatic control application (AAC), Li et al. (2014) based security framework using ECC is proposed by Bai
has provided an attribute-based encryption (ABE) key man- et al. (2015). Their framework ensures the protection against
agement to develop a privacy-preserving protocol (P3). The security risks like confidentiality, integrity and authentica-
P3 protocol is based on ciphertext policy attribute-based tion and privacy is used. The model has eliminated ambigu-
encryption (CP-ABE) and Rivest Shamir and Aldman ity and has shown that a smart card-based application for the
(RSA) public-key encryption algorithm. Their work used a evaluation process has shown that in the future, there can be
key revocation scheme to generate a periodic batch rekeying one smart card per citizen that can be used anywhere, any-
strategy that is apt for resource-limited smart meters. The time. The multifactor authentication and message encryption
ABE revocations reduce the vulnerability window, authorize have ensured the CIA requirements.
the legal activities of smart meters and cover the privacy for To an IP-based communication technology of smart
both the control server end and appliance end. An effective grid applications, Mahmood et al. (2016) have proposed a
multifactor authentication method is proposed by Ahmed lightweight authentication scheme. They have used RSA
and Ahmed (2019) that uses combiner hash functions. Their and AES algorithm to develop a hybrid Diffie-Hellman
work achieves collision resistance, pseudo-randomness and based lightweight authentication scheme. Li et al. (2018)
one-way properties of hash functions. But they lack in pro- have presented a study on ciphertext-only fault analysis
viding complete encryption and decryption solution for IoT (CFA) on light encryption device (LED). The analysis is
applications. done for LEDs like square Euclidean imbalance (SEI), the
Pan et al. (2017) has proposed an ECC based server called goodness of fit (GF), the goodness of fit-square Euclidean
GUESS, which is implemented under the key size of 256-b imbalance (GF-SEI), maximum likelihood (ML), hamming
on a Linux platform. GUESS is used for a heavily loaded weight (HW) and maximum a posteriori (MAP) distinguish-
application like e-commerce and other online transaction ers. Their CFA method took about 152 ciphertexts and 304
required authentication. Also, GUESS supports various ciphertexts to recover the 64-bit and 128-bit secret keys of
categories of ECC schemes like DSA, key agreement and LED, respectively. Through this study, they were able to
encryption. In the near future, the GUESS server is checked analyze the threat of CFA over IoT.
for side-channel attacks. To protect the patient data, Farash A stateful based forwarding stores the routing informa-
and Sabzinejad (2014) developed HiDE to provide a hierar- tion on forwarding state table. Such storages create overhead
chical clustered based framework that as a backbone cluster on the devices and also is susceptible to “varietal” Denial-
with several area clusters. Under this setup, there is an area of-Service expected to occur due to complicated forward-
cluster having a secure access point (SAP) that collects the ing state operations. Liu et al. (2019a) have proposed an
data and aggregates to the root SAP located in the backbone enhanced distributed low-rate attack mitigation (eDLAM)
cluster. HiDE is used to establish a secure session between mechanism. eDLAM stores a lightweight malicious request
each pair of cluster head and cluster members. Hence HiDE table (MRT), which is very small and removed the burden
has maintained the confidentiality of sensitive medical data over the resource-constrained device that incurred during
with low computational overhead. the forwarding state table. Wang et al. (2019) has designed
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8845
a secure, lightweight entity authentication scheme for keys that make the system more complicated. Even if the
hardware primitive called SLATE. SLATE is a challenge- common key is leaked or forged, it is difficult to find the
response based verification system that has shown efficiency specific key. Hence by using collision-free one-way hash-
against the exiting lightweight ciphers. SLATE is resistant ing and XOR operations, they are able to provide consider-
to logic obfuscation and Boolean satisfiability (SAT) attacks able fast computation.
under theoretical information analysis. For an RFID based application, John and Thampi (2016)
have implemented mutual authentication using hybrid ECC
(HECC). The hardness of the proposed method was in solv-
7 Lightweight authentication schemes ing the hyper-elliptic discrete logarithm problem (HCDLP)
that provides security over eavesdropping from breaking
For smart dust based resource-constrained devices, Lee into the cryptosystem. They have used a D-Quark hashing
et al. (2016) have designed an energy-efficient authentica- algorithm. HECC is used to exchange the symmetric keys
tion scheme. Their scheme ensures lightweight mutual veri- between the communicating parties. Pereira et al. (2016)
fication and key exchange mechanism. They have used a has evaluated the proposed method using AVR low-power
simple hash calculation and certificate framework to support micro-controller ATmega-128l controller and have shown
devices with limited hardware resources. For the existing the proposed method is suitable for resource-constrained
security configurations of IEEE 802.11x, (Kim et al. 2017) devices. The proposed Hash-based signature scheme has
designed an authentication and key management scheme shown resistance against pre-image resistance due to the
(AKM) for IEEE 802.11ah based IoT communication. The adoption of randomized hashing using a particular nonce.
design was able to delegate the burden of AKM processes to Wazid et al. (2018) have designed a secure authentica-
a station-side authentication server (SAS). The IoT devices tion scheme for hierarchical IoT networks (HIoTN). HIoTN
delegated the burden of AKM to SAS and had to just ver- is made up of different nodes, gateway nodes, cluster head
ify the authenticity with an access point (AP) using basic node and sensing nodes arranged in a hierarchical manner.
encryption and decryption. Such delegation showed better For such a network, they have proposed a three-factor remote
performance by reducing the authentication workload of the user authentication scheme for HIoTNs called user authenti-
access network. cation key management protocol (UAKMP). UAKMP uses
For applications involving a long period of time like the smart card, password and personal biometric entities to
healthcare, industrial automation system and public facilities provide three-tier user authentication. Even though UAKMP
management, Kim et al. (2016a) have proposed a session key is proved to provide security against known attacks through
establishment based scheme for a clustered sensor network simulation, they were unable to show the same performance
by using ECDH key exchange and hash chain. It showed on a real-time based scenario with resource-constrained
resistance against session key attack, node impersonation devices.
attack, reply attack and node capture attack. It showed the Le et al. (2009) discussed the issues of mutual authen-
main advantage of storing the past and future session keys tication problems in mission-critical applications related
in a repository. But on the real-time work model, these pro- to WSN. They present an ENergy-efficient Access control
cesses consumed device memory space and created over- scheme Based on ECC (ENABLE). The performance of
head on the device. Similarly, for a health care based IoT ENABLE is compared with HBQ[Enable-4] and symmet-
application Chen et al. (2017) has provided a solution to ric key based schemes on SENSE simulator under AODV
secure the patient’s privacy. The devices placed over the protocol that showed ENABLE provided better scalability
patient’s body undergo many physiological movements and with lesser memory requirement and no key predistribution.
are subjected to collect a lot of data. Hence when a doctor As they have used online KDC, if the Internet goes down,
wants to access this data through remote login, the patient providing access control would be difficult.
has to authenticate the doctor. To enable the privacy of user In a cognitive IoT architecture, there are security con-
identity, Yuwen et al., have designed a scheme where a gate- cerns over the radios, hence Lin et al. (2018) have proposed
way knows the shared keys and these keys are shared using two-tier device-based authentication schemes. This setup has
ECDHA to maintain key secrecy. helped them to explore the tradeoff between the detection of
Chung et al. (2015) have proposed a novel anonymous malicious node and spectrum management. But by develop-
authentication scheme that uses the virtual identification ing a joint spectrum allocation and topology control, their
for the IoT devices by ensuring anonymity and authenti- system could be extended to real-time sensing through which
cation. By keeping the uniqueness and virtual identities, they could reduce the end-to-end delay and control the net-
they are providing untraceability of devices. This scheme work access. Using an iterative MerkleDamgard (MD) hash
has helped them to withstand replay attack, forgery and function, a lightweight signing and verification method was
impersonation attacks; they are using common and specific proposed for IoT applications.
13
8846 V. Rao, K. V. Prema
Based on the challenge-response phase of physically application. But providing integrity on sensed data is the
unclonable functions (PUF) of IoT devices, Aman et al. major concern of a secured IoT system. To overcome the
(2017a) have proposed a mutual authentication scheme for shortcoming of Mun et al. scheme, Zhao et al. (2014) has
communication between a device and server and between proposed a unique anonymous authentication scheme for
two devices. The challenge-response method was also used global mobility network (GMN). BAN logic is used to val-
for session key establishment. Even though their system idate the authentication of the scheme. The scheme does
showed improvement in their performance, the latency of not use time-stamp; hence clock synchronization problem
authentication was more due to the number of messages is overruled. The scheme ensures authentication and estab-
exchanged between the entities were increasing with every lishes a session key when the user is in the home network.
session created. For the WSN environment, Lavanya and The efficiency of the scheme has proven for low-power and
Natarajan (2017) proposed a lightweight authentication limited resourced mobile devices.
scheme using mBLAKE2b as hashing method for ECDSA To address the issues related to scalability and resil-
based authentication scheme. Their method was studied for ience to the node compromise attack, hop-by-hop message
performance parameters like energy consumption, through- authentication, and source privacy is proposed by Le et al.
put, latency, packet delivery ratio and signature verification (2009). As the polynomial based scheme has the issue of
using the NS-2 simulator. The security of the method was when a number of message transmission is larger than the
evaluated using the SCYTHER tool. Through the result anal- threshold, the message can be easily cracked by the hacker.
ysis, they have shown a better performance of the authentica- Thereby, the ECC based authentication method is proposed
tion process when compared with traditional authentication that ensures message source privacy. They have presented
schemes. an unconditional secure and efficient source anonymous
The standard methods to provide user authentication are message authentication (SAMA) scheme based on the opti-
password, tokens or biometrics. But these methods also mal modified Elgamal signature (MES) scheme on ECC.
possess security issues. Hence, Srinivas et al. (2017) has The scheme authenticates every intended node and ensures
introduced a new method called biohashing. Biohashing to identify the corrupted message and sources. To setup a
eliminates false acceptance rates without an increase in the secure communication channel between sensor nodes and
occurrence of false rejection rates. This scheme supports the Internet host, a heterogeneous online-offline signcryption
user-friendly password reset and dynamic node addition. method is proposed by Li and Xiong (2013). The work has
Under BAN-logic, their scheme has shown mutual authen- shown resistance against adaptive chosen ciphertext attack
tication between the nodes and also, under the AVISPA under Bilinear Diffie Helman Scheme and unforgeability
tool, they were able to test for man-in-the-middle(MITM) against the chosen message attack. The online phase does
attack and replay attack. But their scheme possessed limi- lighter computations using the message and in the offline
tations in lack of dynamic identities for large growing IoT phase, the heavy computations are done in the absence of
networks. Based on a one-time-password (OTP) based secu- a message. The work has fulfilled CIA and non-repudiation
rity scheme, Shivraj et al. (2015) have proposed a security properties.
scheme to ensure end-to-end authentication between various Lee et al. (2016) have suggested lightweight mutual veri-
IoT devices. They have used a lightweight identity-based fication and key exchange method for smart dust applications
ECC scheme and Lamport’s OTP algorithm. With the argu- of wireless sensor networks based on the IoT environment.
ment of having a two-factor authentication scheme, their In their work, they have used the group signature scheme
experimental proof has shown significantly better perfor- where each sensor node elects a middle node (MN) and
mance than existing standby OTP algorithms. But they are transmits the data collected in the one-hop communication
unable to provide the same efficiency for a widely spread model. In the course of the MN election, the node having
IoT network as generating OTP simultaneously for many more existing resources is selected and complex calcula-
devices is infeasible. tions are performed in MN. During authentication and smart
Kumar et al. (2016) have proposed the ECC-based Access device registration, gateways verify the smart nodes through
Control Protocol (ACP) solution to prevent malicious nodes CA. The security and energy verification of the method is
from eavesdropping the network and also to protect the node performed through functional evaluation. But their work
privacy. During the comparative study of their scheme, the showed drawbacks while updating the group keys of sub-
time taken by ACP in computing point multiplication is miniature devices as they are resource deficit in nature.
much lesser when compared with existing protocols and Lu et al. (2017) proposed a heterogeneous data aggre-
energy consumed during the multiplication is also less. They gation scheme called lightweight privacy-preserving
have concluded that their method is feasible for access con- data aggregation (LPDA) scheme. LPDA is implemented
trol and privacy of the node. But they have failed to address using the Chinese Remainder Theorem, homographic Pail-
the data integrity of the wireless sensor network-based lier encryption scheme and one-way hashing techniques.
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8847
Their scheme was successful in identifying false data and To provide energy efficient authentication for IoT devices,
aggregate hybrid IoT devices data. The proposed scheme Aman et al. (2017b) has proposed a lightweight mutual authen-
is not evaluated for the security of the adversary model. tication protocol that uses Physically Unclonable Functions
In health-care based IoT applications, wearable sensors (PUFs). The protocol is evaluated for two different scenarios,
transmit the data to the server that helps the doctors to firstly, communication between the device and the server and
obtain information using Telecare Medical Information secondly, communication between the devices. Their proto-
System (TMIS). As these data transmission between cols work on a challenge-response mechanism using PUFs
patients and doctors needs continuous authentication, a and stores the secret values of each IoT device with the server.
secure authentication and prescription safety (SAPS) pro- Such storing reduces the performance of the device as it has
tocol is developed by Mahmood et al. (2017). A secure to constantly request the server for the secret values before
three-party key establishment scheme is developed to initiating the communication with other clients.
provide security between doctor and patient during the In the heterogeneous environment, the attacker is prone to
prescription of medicine. The process begins when the impersonate legitimate users. To solve the impersonate attack,
patient registers with the trusted server and obtains the a lightweight anonymous authentication and key agreement
validation before establishing the session key. The SAPS scheme are proposed by Liu et al. (2019b). Their proposed
protocol is analyzed for security using Rubin Logic and method can toggle between the public key infrastructure (PKI)
exhibited properties like verification, user anonymity and and certificateless cryptography. Through security analysis, the
untraceability of the patient in TMIS. method can resist replay and DOS attacks and has shown good
The use of a chaotic map with ECC based cryptosystem scalability. A certificate revocation scheme (CRS) is proposed
has helped to enhance the security of authentication. Dur- by Mahmoud et al. (2015) for smart grid-based applications
ing recent research, the existing research has shown lacking under the vehicle network (Automatic Metering Infrastructure-
security concerns. To improve the security of authentica- AMI). The method uses certificate revocation in pseudony-
tion protocol for resource-constrained devices, Kang et al. mous public-key infrastructure (PPKI) -here a large number of
(2016) have proposed a Markov Chain based authentication certificate public and private keys are assigned to nodes. The
that has shown more security efficiency than the existing. work showed efficiency for vehicle grid application. But not
The work is in comparison with Djellali et al. (Djellali et al. suitable for other IoT applications.
2015) which uses Markov Chain for ubiquitous devices. The As the user and the smart devices communicate over the
work is extended to scalable and changeable networks like insecure communication channel, the sensitive data that is
the multi-server environment and the cloud services system. traveling across the channel are subjected to security and pri-
They have proved a theorem of not saving the verification vacy concerns. To avoid such issues, Shuai et al. (2019) has
table, which leads to passed verification drawbacks in the proposed an anonymous authentication system using ECC
registration phase. Internet Engineering Task Force (IETF) for smart home applications. Their scheme avoided the stor-
has proposed a standard communication protocol called age of verification tables for the authentication process and
Internet Protocol version 6 (IPv6) over Low Power Wire- used a random number method to resist replay attack and
less Personal Area Networks (6LoWPAN) for enabling the resist clock synchronization problems. They have performed
communication of machine-to-machine communication. security analysis using the random oracle model and BAN
Qiu and Ma (2016) has proposed a hybrid scheme called logic. Also, the verification of the method is verified using
enhanced mutual authentication and key establishment ProVerif tool, under which they were able to show secrecy
scheme (EMAKES) for such 6LoWPAN networks. They of the session key and achieve mutual authentication suc-
were able to show resistance towards replay attacks, man- cessfully. To enable direct device-to-device communication,
in-the-middle attack, impersonation attack and Sybil attack Dang et al. (2020) have proposed a ECC based lightweight
using Protocol Composition Logic (PCL). authentication scheme. Their scheme provides secure data
To address the security and privacy issues under smart transmission between cloud server to devices and also
grid applications, Afianti et al. (2019) has proposed a novel between devices too. The protocol is formally evaluated
method using a dynamic cipher puzzle (DCP) called multi- using BAN-logic and shown the resistivity against common
DCP (M-DCP). M-DCP uses RC5 encryption with the ellip- security attacks.
tic curve digital signature algorithm (ECDSA) to ensure the
integrity and authenticity of the user. Also, the DCP hash
function was modified with Merkle Hash Tree and chain 8 Lightweight hash functions
based hash table. But performing double hashing during the
time of new node addition gave computational overhead on Federal Information Processing Standards (FIPS) proposed
the devices and such a setup would be infeasible for real- hash function that took variable data size as input and
time evaluation. produced a fixed size of output (McAndrew 2016b). The
13
8848 V. Rao, K. V. Prema
cryptographic hash function generates a condensed represen- pointed the need for improved BLAKE and hence proposed
tation of the message. These hash functions have two major a new version as BLAKE2 that used 32% less RAM when
properties like, one-way hash function and collision resist- compared to BLAKE and has less overhead with minimized
ance. The one-way hash property, it is defined as, if H(m) is padding. To provide user authentication using a password,
known by the adversary, it should be impossible to extract tokens, or biometrics has raised an issue regarding password
the message “m”. Collision resistance is a property where or token being stolen or forgotten. To handle such condi-
no two hash values should be same i.e., H(m) ≠ H(m� ) . tions, Srinivas et al. (2017) has proposed a new biohashing
Because of these properties, hash function are used in vari- based authentication and key agreement scheme to eliminate
ous applications like message authentication, digital sig- the false accept rate. They have simulated the work using
natures, one-way password file, intrusion detection, virus AVISPA tool and shown resistance against MITM and replay
detection applications (Center 2018). attack. Their work uses the BAN logic to ensure mutual
The commonly used hash functions are message digest authentication. The work supports dynamic node addition
(MD5) and secure hash functions (SHA). During 1993 and user-friendly password change.
National Institute of Standard and Technology (NIST) pub-
lished SHA under FIPS-180-4 specification. FIPS-180-4 has
seven variants of SHA-1 and SHA-2 family has algorithms 9 Security analysis of lightweight
of SHA-224, SHA-256, SHA-384, SHA-512, SHA2-224, cryptography
SHA2-256 and SHA2-512 (Center 2018). Later in 2012 at
SHA competition, FIPS proposed the need of an alternative A statistical analysis of different ECC based authentication
for SHA-2 as SHA-3: Standard Permutation-based Hash and key exchange protocols are subjected to security analysis
and Extendable-output Functions (FIPS-202). SHA3 has and threat modeling by Roy and Khatwani (2017). They have
four fixed-length hash algorithms as SHA3-224, SHA3-256, provided the vulnerability of ECC based cryptosystem under
SHA3-384, and SHA3-512 (NIST 2018; Dworkin 2015). attacks like MITM, clogging attack and database. Hence is
At the Cryptographic Hash Algorithm Competition along it essential to add additional defense layers to guarantee the
with SHA3, BLAKE was also among the top five finalists security against the suspected attacks. An ECC based Light-
proposed by Jean Philippe Aumasson, Luca Henzen, Willi weight authentication protocol with key agreement protocol
Meier and Raphael C (Aumasson et al. 2008; Hao 2014). is proposed for smart-card based IoT applications by Reddy
Even though BLAKE was not selected as SHA3 finalist, it et al. (2016). Their protocol involves a one-way hash func-
has its own high-security margins and good performance. tion, message authentication code and exclusive OR opera-
Ever science BLAKE is proposed it has attracted consider- tions. The work is resistance against replay attack, clock
able applications in resource-constrained device security. synchronization problem, smart card stolen attack, insider
BLAKE is built on a widely known hash structure called attack, user impersonation attack. It also provides forwards
HAsh Iterative FrAmework (HAIFA) that has round itera- secrecy, two factor authentication and mutual authentica-
tions schemes, local wide-pipe internal organization and a tion. RFID based automated patient medication system has
compression function under modified Salsa20 stream cipher. taken a major share in the health care industry. Zhang and
BLAKE-256 produces 256 bits hash digest working on 512 Qi (2014) has presented an ECC based authentication sys-
bits state with 32 bits size of internal word (Hao 2014). Core tem. Through the theoretical proof, their work has shown
BLAKE block transformation combines 16 words of input resistance against tag-information privacy, tag-anonymity,
to 16 working variables and it has 14 or 16 rounds with four backward-traceability and forward-traceability, tag imper-
steps based on BLAKE-256 or BLAKE-512, respectively. sonation attack, spoofing attack and DOS attack. A hybrid
During the course of research, BLAKE showed a better elliptic curve based multi-message signcryption is designed
performance with respect to speed and space complexity. by Rahman et al. (2018). The work is evaluated for security
This was proved on Qualcomm’s krait micro-architecture, requirements like replay attack, integrity, authentication,
during which SHA3-256 took about 20% longer than SHA- non-repudiation, public verifiability, forward secrecy and
256 and SHA3-512 took twice the time of SHA-512. But for unforgeability, using AVISPA tool.
the same platform, BLAKE-512 outperformed SHA-512 by The combination of cloud-based services with IoT has
showing 1.41 times faster than SHA-512 and BLAKE-256 raised to the limitations regarding low-latency and high
showed 1.70 times faster than SHA-256. BLAKE-512 per- mobility of the application. To handle the latency and
formed 5.76 cycles per byte, which is approximately 579 KB mobility limitations, a fog based environment is deployed
per second against 411 KB of SHA-512 on a CPU clocked remotely that are susceptible to security attacks. Hence
at 3.5 GHz (Aumasson et al. 2013). Later, Preneel (Pre- for a health care based Fog-IoT, an authentication scheme
neel 2010) observed that BLAKE’s security and efficiency is proposed by Jia et al. (2018). The three-party bilinear
could be ruled out with an extensive crypt-analysis. Thus he key-agreement protocol is proposed that is resistive against
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8849
MITM, replay attack, known-session key attack, and intrac- share their session keys to the KDC prior to communication.
tability. The WSN applications of IoT are designed to use a Their scheme is resistant towards attacks like replay attack,
pair-wise key, which is used for the long term in the process MITM attack and wiretapped secret-key attack. But the
of communication. As these pair-wise keys have a long life- scheme lack the security of the session key, which sharing
time when being hacked, the data can be altered, and the with the KDC, i.e., if the session key KIR is compromised,
privacy of the user can be questioned. To reduce such an the whole device could be hacked. In a large-scale system
impact on the device, a session key based key exchange is communicating over LTE, the network is skeptical about
developed by Kim et al. (2016b). In this work, an elliptic data security and user privacy. For such an environment,
curve Diffie–Helman (EDHA) based session key exchange is Saxena et al. (2016) have proposed an authentication and
proposed for clustered based sensor networks. To provide the key agreement (AKA) protocol. They have used sequence
authentication for the participanting entities, the hash-chain numbers for each authentication package instead of MAC
is used between the gateway and the cluster head. Through verification information and shown resistance against chosen
the proposed method, the number of communicating mes- message attack, key secrecy and theft, MITM attack, replay
sages is reduced and has provided security against MITM attack and impersonation attack.
attacks, session key attacks, replay attacks, node impersona- In machine-type communication devices (MTCDs),
tion attacks and node capture attacks. the communication is based on LTE/LTE-A network, the
A multi-factor remote login based authentication method MTCDs access the network simultaneously and each MTCD
is proposed by Dhillon and Kalra (2017). This method is a has to be independently authenticated with the network base
combination of three different authentication mechanisms station. During such a simultaneous process, there maybe
like password-based, biometric and smart devices. The be congestion and signal overhead on the network. To
biometric-based authentication has complied with Discrete avoid these issues, Fu et al. (2016) has presented a group
cosine transform (DCT) and Principal component analysis authentication mechanism that reduces signal overhead
(PCA) based hashing function. Under formal and informal and provides robust privacy-preserving for each MTCD
security analysis, the proposed three-factor authentica- along with anonymity, unlinkability and traceability. Their
tion has shown resistance to attacks like password guess- method is evaluated using ProVerif tool and the method has
ing attack, password change attack, parallel session attack, shown resistance against DoS attacks, MITM and imper-
denial of service attack, stolen smart device attack, and sonation attacks. In multi-server based mutual authentication
impersonation attack. Annor-Asante and Pranggono (2018) schemes, the user must log in separately for each service
has designed a real-time test-bed that is created using the and remember the login credentials like multiple identities
Arduino Uno and Xbee module to check the resistance of and passwords. Such an environment is inclined to password
smart grid application against Distributed Denial-of-Service guessing attacks, MITM, eavesdropping, replay attacks. To
(DDoS). They have developed cyber-security software with avoid such attacks, Tomar and Dhar (2019) has designed a
SCADA and PLC programming for the evaluation of cyber- multi-control server environment that uses the user’s biom-
security research. etric and password to authenticate them. The ECC is used
As the Wireless Body Area Network (WBAN) based to strengthen security. Through informal security analysis
application carries sensitive data of the patient and any using Burrow–Adabi–Needham (BAN) logic and fuzzy
incorrect data of the sensor reading into the server, it can extractor, their work has shown resistance against DOS
lead to severe wrong diagnostic by the doctor. Thereby, Wu attacks, MITM attacks, replay attacks and stolen smart card
et al. (2016) have proposed an anonymous authentication attacks.
scheme that provided mutual authentication and privacy To a wearable devices based application, Kumar et al.
preservation along with session key generation for data (2019) has proposed an ECC based authentication scheme.
encryption. Their work is in comparison with existing Wang They have verified their work using ProVerif tool and shown
and Zhang (2015), which showed a drawback in providing resistance against known attacks. As the user and the smart
an impersonation attack between adversary or a legal client devices communicate over the insecure communication
and another legal client. But the authentication proposed channel, the sensitive data that is traveling across the chan-
by Libing Wu et al. has not shown the resistance towards nel are subjected to security and privacy concerns. To avoid
eavesdropping and chosen-ciphertext attacks. such issues, Shuai et al. (2019) has proposed an anonymous
An inter-device authentication and session key sharing authentication system using ECC for smart home applica-
scheme is proposed by Park and Kang (2016). To overcome tions. Their scheme avoided the storage of verification tables
the drawbacks of the key distribution center (KDC) shar- for the authentication process and used a random number
ing the session keys to all the participants, they have made method to resist replay attack and resist clock synchroni-
each participant generate their own session keys. Thereby zation problems. They have performed security analysis
each device involving the network communication shall using the random oracle model and BAN logic. Also, the
13
8850 V. Rao, K. V. Prema
verification of the method is verified using ProVerif tool, theorem checking, proofs are established using higher-order
under which they were able to show secrecy of the session logic. Also, they have mentioned about few model checking
key and achieve mutual authentication successfully. tools like AVISPA, CryptoVerif, ProVerif and SCYTHER
To overcome the reusing of existing protocol for IoT as the second option for formal method analysis.
based applications, a CoAP based bootstrapping method is Rubin and Honeyman (1993) have used Meadow’s classi-
designed and implemented by Garcia-Carrillo and Marin- fication (Meadows 1992) of analysis to categorized the veri-
Lopez (2016). The Extensible Authentication Protocol fication model into four types. Type-I uses specific language
(EAP) and Authentication Authorization and Accounting and tools that are not designed for cryptographic protocols.
(AAA) technologies are used to ensure flexibility, scalability Type-II helps to develop a system that can be used by a
and accountability. They have compared the proposed design designer to develop and investigate different scenarios/cases.
by implementing it under Contiki and PANATIKI tools and Type-III use knowledge and belief strategy to analyze the
have analyzed the work under memory footprint, data pro- model logically. Lastly, Type-IV uses algebraic terms and
cessing time, message length, bootstrapping time and energy equations to rewrite the cryptographic system. Zhu (2003)
consumption. They are unable to check the proposed method has developed a scheme that provides the security of ECC
under real-time Low Power Wide Area Network, which has against the adaptive chosen message attack (ACMA). He
smaller message sizes and also security over post-bootstrap- has used decisional Diffie–Hellman assumption to prove the
ping is not shown. ACMA.
For the authentication of mobile-based communication Nam et al. (2014) have extended Bellare, Pointcheval and
Li (2012) had proposed a scheme with roaming services Rogaway (BPR) (Bellare et al. 2000) to evaluate the user
and user anonymity. However, an attacker could intercept anonymity property and two-factor security. They showed
the identity of a mobile user’s home agent, Chain et al. that their model could capture insider attacks, an offline dic-
(2016) have proposed an elliptic curve-based wireless tionary attack with security properties like authentication,
roaming anonymous login method that resolves the issues perfect forward secrecy, known-key security, session key
of Li’s scheme. They have used Burrows–Abadi–Needham and resistance against insider attack. The security properties
(BAN) logic for analyzing the security of their authentica- were proved using elliptic curve computation Diffie–Hell-
tion scheme. man (ECCDH) assumptions. Chen et al. (2015) have pro-
For smart meter based application, Garg et al. (2019) posed a two-way user authentication and secure session key
has proposed a mutual authentication based key exchange agreement scheme based on a self-certified public key sys-
mechanism using ECC. They have performed formal secu- tem. Through their formal security analysis, the proposed
rity analysis and proved the resistance against DoS attacks, scheme showed resistance towards attacks like impersona-
replay attacks, impersonation attacks. With mutual authen- tion, known-key security, masquerading, forward and back-
tication, the forward secrecy is also maintained. Further, the ward secrecy, MITM and replay attack.
security analysis is studied under two different categories.
Primarily, a study of existing authentication scheme under 9.2 Real‑time security analysis
theoretical proof is analyzed and later, a various real-time
testbed for performing attacks on a Raspberry Pi-based net- Featuring the rapid growth of smart cities, Al Barghuthi
work is briefed. et al. (2017) has made a study of how the increase in the
population of smart cities shall add to an increase in the
9.1 Theoretical security analysis security breach and damage the business by 2050. Thus, they
have proposed Kali Linux based vulnerability assessment
Over the past three decades, many security protocols, frame- and penetration testing solution using low-cost Raspberry
works, and technologies have been developed to evalu- Pi-3 devices. Through their results, it has been concluded
ate real-life security solutions for various networks and that Raspberry Pi 3 can be used as a machine to check the
domains. Matsuo et al. (2010) have proposed a framework vulnerability check similar to any traditional PC or laptop-
that includes protocol design and protocol certification. They based Kali Linux machine.
have studied various formal verification methods under three To replace the expensive and resource-intense devices
different categories; the first study is done under the capacity used for industrial vulnerability and assessment tests, Hu
of the method used, second is based on various skills needed et al. (2016) has proposed an automated vulnerability assess-
by the designer to evaluate, and lastly, a question-answer ment using OpenVAS and Raspberry Pi-3 device. They have
based security requirements. Using the inductive approach detailed methods for analyzing the vulnerability assessment
provided by Paulson (1998) has further sub-classified their of distributed architecture. They have made the study on var-
work under model checking and theorem proving. The iables like CPU temperature, CPU usage and CPU memory
model checking is a form of algorithm verification, and in of the device at the time of vulnerability assessment.
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8851
Visoottiviseth et al. (2017) have developed a GUI based Before modeling a threat, there are four questions to be
penetration testing tool called PENTOS used for IoT devices. answered and they are:
PENTOS runs on Kali Linux and is specifically designed
for the ethical hacking of wireless communication like 1 What are we building?
WiFi and Bluetooth. PENTOS enables the analysis of pass- • A detailed data flow diagram (DFD) is designed by
word attack, web attack and wireless attack that ensure to specifying various roles and responsibilities of each
gain access privilege of the various algorithms. They also participants.
have explained the Open Web Application Security Project 2 What can go wrong?
(OWASP) specified ten vulnerabilities of IoT applications. • The various possible threats are analyzed using meth-
Finally, they have given the recommendations for the secure ods available in STRIDE, PASTA, STRIKE or VAST.
deployment of the IoT environment. 3 What are we going to do about that?
Denis et al. (2016) have performed various penetration • Potential mitigation strategies against the threats are
testing using tools available on Kali Linux. They were able framed.
to set up a private network and generate attack reports and 4 Did we do a good job?
visualize the reports using Kali Linux tools. The attacks they • Once the mitigation are applied, the system is vali-
performed were hacking phones, MITM attack, smartphone dated for the stability and security against the threats.
penetration testing, spying, hacking phones Bluetooth, hack-
ing WPA protected and then hacked the remote PC using IP 10.1 Microsoft secure development lifecycle
and open ports. (microsoft SDL)
Liang et al. (2016) have experimented on different meth-
ods of doing DOS attack using Raspberry Pi based Kali Microsoft SDL was introduced in 2008 to ensure security
Linux. They have provided an attack framework and com- and privacy considerations throughout all the phases of the
pared various DOS attacks on their framework. They have development process. This helped developers to build highly
used Hping3 with random IP, SYN flood with sproofed IP secure software, addressing security compliance require-
and TCP connect flood tools. The comparison was made ments and reduce development costs. The core of Microsoft
under the parameters like CPU utilization, memory utility, SDL is threat modeling. The threat modeling helps in shap-
time for the success of an attack and packet loss rate. Mur- ing the application design and meet the security objectives
ray (2017) has proposed a forwarded looking approach for of the company by reducing the risk severity. The five major
a secure eHealth solution called HealthShare. That could steps of threat modeling involves (Fig. 8):
share data among various organizations that were hosting
the patient’s data over the cloud. He has provided detailed 1 Defining security requirements: To understand the eco-
steps as to conduction of MITM and DOS attack using tools system of the device, i.e., analysis of the ToE by fram-
like Ettercap, Pexpect, manual SET, threads using the timer ing various use-cases. In this process, the external and
and Nmap timer and Scapy. internal assets are identified.
2 Creating an application diagram: Here, a detailed data
flow diagram of the proposed ToE is framed with appro-
10 Threat modeling for smart applications
13
8852 V. Rao, K. V. Prema
priate trust boundaries and security requirements for The below section helps the user to customized his own tem-
each participant. plate on the default Microsoft SDL template.
3 Identifying the threats: Microsoft TMT follows STRIDE When the threat model section is selected with the appro-
based threat modeling where the threats are identified. priate template, a new window is open, which can be seen
Potential adversaries are identified under four categories in Fig. 10. By using Drawing area, a Data Flow Diagram
called remote software attacker, network attacker, mali- (DFD) can be built using the options available in Stencil
cious insider attacker and advance hardware attacker. sub-window located at the right corner of the window. This
4 Mitigate the threats: For the threat identified, relevant view is called as Design View. Every DFD must contain at
countermeasures are established. least each one of process, data flow direction, data storage,
5 Validating that threats have been mitigated: Finally, the internal inter-actors and trust boundaries from the stencil
verification of a threat model against the mitigation is sub-window.
performed to check the stability of the proposed system. Once the DFD is framed, the threats can be analyzed
using Analysis View tab as shown in Fig. 11. Under this
page, we can observe the threats that are identified by the
SDL template and also possible mitigation strategies are
10.2 STRIDE framework methodology displayed for the users conveniences based on the default
template definition. The user can scroll down the page to see
It is essential to develop a secure design for any software the threats and its severity level. When scrolled down, at the
application or system. Failing to do so may cost about 30 status box the message would be Not started, which means
times higher than estimated cost (Verheyden 2018). Hence the threat needs to be attended. Once the threat is handled,
threat modeling plays a vital role is the software develop- it can be changed to mitigated.
ment lifecycle. Among various threat modeling methods Figure 12 displays an HTM page of threat analysis report
like STRIDE, PASTA, VAST and STRIKE, STRIDE has generated by the TMT tool. It displays the summary of the
taken a major share among the industrial development pro-
cess (Bodeau et al. 2018; Meghanathan et al. 2010). Micro-
soft develops STRIDE as a part of its security development
lifecycle. STRIDE is an acronym for Spoofing, Tampering,
Repudiation, Information Disclosure, Denial of Service and
Elevation of privilege (Khan et al. 2017). The security prop-
erties and attack type associated with STRIDE are summa-
rized in Table 3 (Verheyden 2018).
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8853
13
8854 V. Rao, K. V. Prema
attacker if anyone set of keys is obtained using various Afianti F, Suryani T et al (2019) Lightweight and dos resistant mul-
attacks like MITM attacks, chosen cipher-text attacks, tiuser authentication in wireless sensor networks for smart grid
environments. IEEE Access 7:67107–67122
replay attacks. Such a scenario calls for the use of a dif- Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered
ferent set of PKC keys for different levels of security. approach for attacks and defenses. In: Communication tech-
• From the review, it has been seen that the security evalu- nologies (ComTech), 2017 international conference on, IEEE,
ation of the schemes are either done using a theoretical pp 104–110
Ahmed AA, Ahmed WA (2019) An effective multifactor authenti-
method or using simulation tools like AVISPA, ProV- cation mechanism based on combiners of hash function over
erif etc. But a real-time security evaluation is not done. internet of things. Sensors 19(17):3663
Thereby, a thorough theoretical and experimental secu- Al Barghuthi NB, Saleh M, Alsuwaidi S, Alhammadi S (2017) Eval-
rity analysis is needed. The mapping of experimental and uation of portable penetration testing on smart cities applica-
tions using raspberry pi III. In: 2017 fourth HCT information
theoretical security analysis helps to evaluate the pro- technology trends (ITT), IEEE, pp 67–72
posed security scheme for the real-time scalable network. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash
M (2015) Internet of things: a survey on enabling technolo-
gies, protocols, and applications. IEEE Commun Surv Tutor
17(4):2347–2376
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of
12 Conclusion Things security: a survey. J Netw Comput Appl 88:10–28. https
://doi.org/10.1016/j.jnca.2017.04.002
Machine-to-machine communication plays a vital role in Aman MN, Chua KC, Sikdar B (2017a) Mutual authentication in IoT
systems using physical unclonable functions. IEEE Internet
both wired and wireless environments of IoT. In IoT, the Things J 4(5):1327–1340
devices are equipped with sensing and smaller computa- Aman MN, Chua KC, Sikdar B (2017b) Mutual authentication in
tional capabilities that are driven by energy constraints. IOT systems using physical unclonable functions. IEEE Inter-
These devices communicate among each other over publi- net Things J 4(5):1327–1340
Ammar M, Russello G, Crispo B (2018) Internet of Things: a survey
cally available communication. Thereby, these communica- on the security of IoT frameworks. J Inf Secur Appl 38:8–27.
tions are susceptible to various attacks. The major issue with https://doi.org/10.1016/j.jisa.2017.11.002
such devices it maintains the privacy of users and data to Annor-Asante M, Pranggono B (2018) Development of smart
be transmitted unaltered. Hence, it is essential to maintain grid testbed with low-cost hardware and software for cyber-
security research and education. Wirel Personal Commun
authentication and data integrity. As these devices use a bat- 101(3):1357–1377
tery and have work for a longer period of time, it is impor- Atamli AW, Martin A (2014) Threat-based security analysis for the
tant to design cryptographic solutions that are lightweight internet of things. Secure Internet of Things (SIoT). Interna-
and secure. This study provides various authentication and tional workshop on, IEEE, pp 35–43
Aumasson JP, Henzen L, Meier W, Phan RCW (2008) SHA-3 pro-
data integrity based schemes that are suitable for resource- posal BLAKE. Submission to NIST. https://doi.org/10.1093/
constrained devices of IoT. Also, the study describes the gmo/9781561592630.article.o904247
Microsoft threat modeling tool (TMT) that can be used as Aumasson JP, Neves S, Wilcox-OHearn Z, Winnerlein C (2013)
a part of any secure development life cycle (SDLC) of IoT BLAKE2: simpler, smaller, fast as MD5. In: International
conference on applied cryptography and network security.
based applications. Springer, pp 119–135. https: //doi.org/10.1007/978-3-642-
38980-1_8
Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embed-
Compliance with ethical standards ded security framework for Internet-of-Things. In: Wireless
communication, vehicular technology, information theory and
aerospace and electronic systems technology (Wireless VITAE),
Conflict of interest First author, Vidya Rao declares that she has no
2011 2nd international conference, IEEE, pp 1–5
conflict of interest. Prema K.V., the second author, declares that she
Bai TDP, Rabara SA, Jerald AV (2015) Elliptic curve cryptography
has no conflict of interest.
based security framework for Internet of Things and cloud com-
puting. In: Conference on recent advances on computer engineer-
Ethical approval This article does not contain any studies with human
ing by WSEAS, pp 65–73. https: //doi.org/10.1109/wccct. 2016.20
participants or animals performed by any of the authors.
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key
exchange secure against dictionary attacks. In: International
conference on the theory and applications of cryptographic tech-
niques. Springer, pp 139–155
Bernstein DJ, Lange T, et al (2013) Safecurves: choosing safe curves
References for elliptic-curve cryptography. http://safecurvescrypto
Bodeau D, McCollum C, Fox D (2018) Cyber threat modeling: survey,
Abomhara M, Kien G (2015) Cyber security and the Internet-of- assessment, and representative framework. The Mitre Corpora-
Things: vulnerabilities, threats, intruders and attacks. J Cyber tion, HSSEDI, Bedford
Secur 4:65–88 Camtepe SA, Yener B (2004) Combinatorial design of key distribution
Abomhara M, Køien GM (2014) Security and privacy in the Internet- mechanisms for wireless sensor networks. In: European sympo-
of-Things: Current status and open issues, pp 1–8 sium on research in computer security. Springer, pp 293–308
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8855
Center CSR (2018) Hash functions. https: //csrc.nist.gov/Projec ts/Hash- International workshop on cryptographic hardware and embed-
Functions ded systems. Springer, pp 119–132. https: //doi.org/10.1007/978-
Chain K, Kuo WC, Cheng JC (2016) A novel mobile communications 3-540-28632-5_9
authentication scheme with roaming service and user anonymity. Hafsa Tahir AK, Junaid M (2016) Internet-of-Things (IoT): an over-
Appl Sci 6(12):393 view of applications and security issues regarding implementa-
Chen H, Ge L, Xie L (2015) A user authentication scheme based on tion. Int J Multidiscip Sci Eng 7(1):14–22
elliptic curves cryptography for wireless ad hoc networks. Sen- Hao Y (2014) The boomerang attacks on Blake and Blake2. In: Inter-
sors 15(7):17057–17075 national conference on information security and cryptology.
Chen Y, Martínez JF, Castillejo P (2017) López L (2017) A privacy Springer, pp 286–310
protection user authentication and key agreement scheme tailored He D, Zeadally S (2015) An analysis of RFID authentication schemes
for the Internet of Things environment: PriAuth. Wirel Commun for Internet-of-Things in healthcare environment using elliptic
Mob Comput curve cryptography. IEEE Internet Things J 2(1):72–83
Chung Y, Choi S, Won D (2015) Anonymous authentication scheme Hu F (2016) Security and privacy in Internet of Things (IoTs): models,
for intercommunication in the Internet of Things environments. algorithms, and implementations. CRC Press, London. https://
Int J Distrib Sens Netw 11(11):305785 doi.org/10.1201/b19516
Chung Y, Choi S, Lee Y, Park N, Won D (2016) An enhanced light- Hu Y, Sulek D, Carella A, Cox J, Frame A, Cipriano K (2016) Employ-
weight anonymous authentication scheme for a scalable localiza- ing miniaturized computers for distributed vulnerability assess-
tion roaming service in Wireless Sensor Networks. Multidiscip ment. In: 2016 11th international conference for internet technol-
Digit Publ Inst Sens 16(10):1653 ogy and secured transactions (ICITST), IEEE, pp 57–61
Conti M, Dragoni N, Lesyk V (2016) A survey of Man In The Middle Jansma N, Arrendondo B (2004) Performance comparison of elliptic
attacks. IEEE Commun Surv Tutor 18(3):2027–2051 curve and RSA digital signatures. nicj net/files
Da Xu L, He W, Li S (2014) Internet of Things in industries: a survey. Jia X, He D, Kumar N, Choo KKR (2018) Authenticated key agreement
IEEE Trans Ind Inf 10(4):2233–2243 scheme for fog-driven IoT healthcare system. Wirel Netw. https
Dang TK, Pham CD, Nguyen TL (2020) A pragmatic elliptic curve ://doi.org/10.1007/s11276-018-1759-3
cryptography-based extension for energy-efficient device-to- Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Inter-
device communications in smart cities. Sustain Cities Soc net of Things: perspectives and challenges. Springer Wirel Netw
20:102097 20(8):2481–2501
Denis M, Zena C, Hayajneh T (2016) Penetration testing: concepts, John AL, Thampi SM (2016) Mutual authentication based on HECC
attack methods, and defense strategies. In: 2016 IEEE long island for RFID implant systems. In: International symposium on secu-
systems, applications and technology conference (LISAT), IEEE, rity in computing and communication. Springer, pp 18–29
pp 1–6 Kang D, Jung J, Mun J, Lee D, Choi Y, Won D (2016) Efficient and
Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentica- robust user authentication scheme that achieve user anonymity
tion scheme for internet of things environments. Int J Commun with a Markov chain. Secur Commun Netw 9(11):1462–1476
Syst 30(16):e3323 Khan R, McLaughlin K, Laverty D, Sezer S (2017) Stride-based threat
Djellali B, Belarbi K, Chouarfia A, Lorenz P (2015) User authentica- modeling for cyber-physical systems. In: 2017 IEEE pes innova-
tion scheme preserving anonymity for ubiquitous devices. Secu- tive smart grid technologies conference Europe (ISGT-Europe),
rity and Communication Networks 8(17):3131–3141 IEEE, pp 1–6
Dworkin MJ (2015) Sha-3 standard: permutation-based hash and Kim J, Moon J, Jung J, Won D (2016a) Security analysis and improve-
extendable-output functions. Tech. rep. https://www.nist.gov/ ments of session key establishment for clustered sensor networks.
publications/sha-3-standard-permutation-based-hash-and-exten J Sens 20:20
dable-output-functions Kim J, Moon J, Jung J, Won D (2016b) Security analysis and improve-
ECRYPT I (2012) Yearly report on algorithms and keysizes. ECRYPT ments of session key establishment for clustered sensor networks.
II Network of Excellence (NoE), funded within the Information J Sens 20:20
Societies Technology (IST) Programme of the European Com- Kim KW, Han YH, Min SG (2017) An authentication and key man-
missions Seventh Framework Programme (FP7) agement mechanism for resource constrained devices in IEEE
Farash Sabzinejad M (2014) Cryptanalysis and improvement of an 802.11-based IoT access networks. Sensors 17(10):2170
efficient mutual authentication RFID scheme based on elliptic Kumar P, Gurtov A, Iinatti J, Sain M, Ha PH (2016) Access control
curve cryptography. J Supercomput 70(2):987–1001 protocol with node privacy in Wireless Sensor Networks. IEEE
Fu A, Song J, Li S, Zhang G, Zhang Y (2016) A privacy-preserving Sens J 16(22):8142–8150
group authentication protocol for machine-type communication Kumar D, Grover HS et al (2019) A secure authentication protocol
in lte/lte-a networks. Secur Commun Netw 9(13):2002–2014 for wearable devices environment using ECC. J Inf Secur Appl
Garcia-Carrillo D, Marin-Lopez R (2016) Lightweight coap-based 47:8–15
bootstrapping service for the internet of things. Sensors Lauter K (2004) The advantages of elliptic curve cryptography for
16(3):358 wireless security. IEEE Wirel Commun 11(1):62–67
Garg S, Kaur K, Kaddoum G, Rodrigues JJ, Guizani M (2019) Secure Lavanya M, Natarajan V (2017) LWDSA: light-weight digital signature
and lightweight authentication scheme for smart metering infra- algorithm for wireless sensor networks. Sādhanā 42(10):1629–
structure in smart grid. IEEE Trans Ind Inform 20:20 1643. https://doi.org/10.1007/s12046-017-0718-5
Gayoso Martínez V, Hernández Álvarez F, Hernández Encinas L, Le XH, Lee S, Butun I, Khalid M, Sankar R, Kim M, Han M, Lee
Sánchez Ávila C (2011) Analysis of ECIES and other crypto- YK, Lee H (2009) An energy-efficient access control scheme for
systems based on elliptic curves. Machine Intelligence Research wireless sensor networks based on elliptic curve cryptography. J
Labs. https://www.researchgate.net/publication/255970196 Commun Netw 11(6):599–606
Glissa G, Rachedi A, Meddeb A (2016) (2016) A secure routing proto- Lee J, Sung Y, Park JH (2016) Lightweight sensor authentication
col based on RPL for Internet of Things. Global communications scheme for energy efficiency in ubiquitous computing environ-
conference (GLOBECOM). IEEE, IEEE, pp 1–7 ments. Sensors 16(12):2044
Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Compar- Lenstra AK, Verheul ER (2001) Selecting cryptographic key sizes.
ing elliptic curve cryptography and RSA on 8-bit CPUs. In: Springer J Cryptol 14(4):255–293
13
8856 V. Rao, K. V. Prema
Li CT (2012) A more secure and efficient authentication scheme with conference, CNSA 2010, Chennai, India, July 23–25, 2010 Pro-
roaming service and user anonymity for mobile communications. ceedings, vol 89. Springer, Berlin
Inf Technol Control 41(1):69–76 Meier AV (2005) The Elgamal cryptosystem. http://wwwmayr.in.tum.
Li F, Xiong P (2013) Practical secure communication for integrating de/konferenzen/Jass05 /courses /1/papers/meier/paper.pdf
wireless sensor networks into the Internet-of-Things. IEEE Sens Miller VS (1985) Use of elliptic curves in cryptography. In: Confer-
J 13(10):3677–3684 ence on the theory and application of cryptographic techniques.
Li D, Aung Z, Williams J, Sanchez A (2014) P3: privacy preservation Springer, pp 417–426. https://doi.org/10.1007/3-540-39799
protocol for automatic appliance control application in smart -X_31
grid. IEEE Internet Things J 1(5):414–429 Mössinger M, Petschkuhn B, Bauer J, Staudemeyer RC, Wójcik M,
Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for IoT Pöhls HC (2016) Towards quantifying the cost of a secure IoT:
and its applications. IEEE Trans Sustain Comput 2(4):359–370 overhead and energy consumption of ECC signatures on an arm-
Li W, Liao L, Gu D, Li C, Ge C, Guo Z, Liu Y, Liu Z (2018) Cipher- based device. In: World of wireless, mobile and multimedia net-
text-only fault analysis on the led lightweight cryptosystem works (WoWMoM), 2016 IEEE 17th international symposium
in the internet of things. IEEE Trans Depend Secure Comput on A, IEEE, pp 1–6
16(3):454–461 Murray R (2017) A raspberry pi attacking guide
Liang L, Zheng K, Sheng Q, Huang X (2016) A denial of service attack Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-
method for an IOT system. In: 2016 8th international conference based authentication scheme for wireless sensor networks. Sen-
on information technology in medicine and education (ITME), sors 14(11):21023–21044
IEEE, pp 360–364 Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of things (IoT):
Lin SC, Wen CY, Sethares WA (2018) Two-tier device-based authen- taxonomy of security attacks. In: Electronic design (ICED), 2016
tication protocol against PUEA attacks for IoT applications. 3rd international conference on, IEEE, pp 321–326
IEEE Trans Signal Inf Process Netw 4(1):33–47. https://doi. NIST (2018) SHA-3 standardization. https://csrc.nist.gov/projects/
org/10.1109/TSIPN.2017.2723761 hash-functions/sha-3-standardization
Liu A, Ning P (2008) TinyECC: A configurable library for elliptic Pan W, Zheng F, Zhao Y, Zhu WT, Jing J (2017) An efficient ellip-
curve cryptography in wireless sensor networks. In: Proceedings tic curve cryptography signature server with GPU acceleration.
of the 7th international conference on Information processing in IEEE Trans Inf Forensics Secur 12(1):111–122
sensor networks, IEEE Computer Society, pp 245–256. https:// Park N, Kang N (2016) Mutual authentication scheme in secure internet
doi.org/10.1109/ipsn.2008.47 of things technology for comfortable lifestyle. Sensors 16(1):20
Liu G, Quan W, Cheng N, Zhang H, Yu S (2019a) Efficient ddos attacks Parrilla L, Castillo E, López-Ramos JA, Álvarez-Bermejo JA, García
mitigation for stateful forwarding in internet of things. J Netw A, Morales DP (2018) Unified compact ECC-AES co-processor
Comput Appl 130:1–13 with group-key support for IoT devices in wireless sensor net-
Liu J, Ren A, Zhang L, Sun R, Du X, Guizani M (2019b) A novel works. Sensors 18(1):251
secure authentication scheme for heterogeneous internet of thing. Paulson LC (1998) The inductive approach to verifying cryptographic
CoRR abs/1902.03562 protocols. J Comput Secur 6(1–2):85–128
Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight Peng L, Ru-chuan W, Xiao-yu S, Long C (2013) Privacy protection
privacy-preserving data aggregation scheme for fog computing- based on key-changed mutual authentication protocol in Inter-
enhanced IoT. IEEE Access 5:3302–3312 net-of-Things. China conference wireless sensor networks, pp
Luhach AK et al (2016) Analysis of lightweight cryptographic solu- 345–355
tions for Internet-of-Things. Indian J Sci Technol 9:28 Pereira GC, Puodzius C, Barreto PS (2016) Shorter hash-based signa-
Mahmood K, Chaudhry SA, Naqvi H, Shon T, Ahmad HF (2016) A tures. J Syst Softw 116:95–100
lightweight message authentication scheme for smart grid com- Preneel B (2010) The first 30 years of cryptographic hash func-
munications in power sector. Comput Electr Eng 52:114–124 tions and the NIST SHA-3 competition. Cryptographers track
Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication at the RSA conference. Springer, Berlib, pp 1–14. https://doi.
and prescription safety protocol for telecare health services using org/10.1007/978-3-642-11925-5_1
ubiquitous iot. Appl Sci 7(10):1069 Qiu Y, Ma M (2016) A mutual authentication and key establishment
Mahmoud MM, Mišić J, Akkaya K, Shen X (2015) Investigating pub- scheme for m2m communication in 6lowpan networks. IEEE
lic-key certificate revocation in smart grid. IEEE Internet Things Trans Ind Inf 12(6):2074–2085
J 2(6):490–503 Rahaman O (2017) Data and information security in modern world by
Matsuo S, Miyazaki K, Otsuka A, Basin D (2010) How to evaluate the using elliptic curve cryptography. Comput Sci Eng 7(2):29–44
security of real-life cryptographic protocols? In: International Rahman AU, Ullah I, Naeem M, Anwar R, ul Amin N, Khattak H,
conference on financial cryptography and data security. Springer, Ullah S (2018) A lightweight multi-message and multi-receiver
pp 182–194 heterogeneous hybrid signcryption scheme based on hyper ellip-
Mazumder R, Miyaji A, Su C (2017) A simple authentication encryp- tic curve. Int J Adv Comput Sci Appl 9(5):160–167. https://doi.
tion scheme. Concurr Comput Pract Exp 29(16):e4058 org/10.14569/ijacsa.2018.090520,
McAndrew A (2016a) Introduction to cryptography with open-source Reddy AG, Yoon EJ, Das AK, Yoo KY (2016) Lightweight authentica-
software tion with key-agreement protocol for mobile network environ-
McAndrew A (2016b) Introduction to cryptography with open-source ment using smart cards. IET Inf Secur 10(5):272–282
software. CRC Press, New York. https://doi.org/10.1201/97814 Roy A, Karforma S (2012) A survey on digital signatures and its appli-
39825716 cations. J Comput Inf Technol 3(1):45–69
McGrath MJ, Scanaill CN (2013) Sensor technologies: healthcare. Roy S, Khatwani C (2017) Cryptanalysis and improvement of ECC
Apress, wellness and environmental applications based authentication and key exchanging protocols. Cryptogra-
Meadows C (1992) Applying formal methods to the analysis of a key phy 1(1):9
management protocol. J Comput Secur 1(1):5–35 Rubin AD, Honeyman P (1993) Formal methods for the analysis of
Meghanathan N, Boumerdassi S, Chaki N, Nagamalai D (2010) Recent authentication protocols. Tech. rep, Center for Information Tech-
trends in network security and applications: third international nology Integration
13
A review on lightweight cryptography for Internet‑of‑Things based applications 8857
Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol international conference on security and management (SAM), pp
for an IoT-enabled LTE network. ACM Trans Internet Technol 261–262. https://csce.ucmss.com/cr/books/2017/LFS /CSREA
16(4):1–20 2017/SAM9760.pdf
SEC S (2000) Sec 2: recommended elliptic curve domain parameters. Wang J, Li J, Wang H, Zhang LY, Cheng LM, Lin Q (2018) Dynamic
Standards for Efficient Cryptography Group, Certicom Corp. scalable elliptic curve cryptographic scheme and its applica-
https://www.secg.org/SEC2-Ver-1.0.pdf tion to in-vehicle security. IEEE Internet Things J. https://doi.
Shivraj V, Rajan M, Singh M, Balamuralidhar P (2015) One time pass- org/10.1109/JIOT.2018.2869872.https://ieeexplore.ieee.org/
word authentication scheme based on elliptic curves for Internet- document/8463502
of-Things (IoT). IEEE, pp 1–6 Wang WC, Yona Y, Wu Y, Diggavi SN, Gupta P (2019) Slate: a secure
Shostack A (2014) Threat modeling: designing for security. Wiley, lightweight entity authentication hardware primitive. IEEE Trans
Oxford Inf Forensics Secur 15:276–285
Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentica- Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design
tion scheme for smart home environment with provable security. of secure user authenticated key management protocol for
Comput Secur 86:132–146 generic IoT networks. IEEE Internet Things J 5(1):269–282
Silverman JH (2009) The arithmetic of elliptic curves, vol 106. Wenger E (2013) Hardware architectures for MSP430-based wireless
Springer. https://doi.org/10.1007/978-0-387-09494-6. https:// sensor nodes performing elliptic curve cryptography. In: Interna-
link.springer.com/book/10.1007/978-0-387-09494-6 tional conference on applied cryptography and network security.
Srinivas J, Mukhopadhyay S, Mishra D (2017) Secure and efficient Springer, pp 290–306. https://doi.org/10.1007/978-3-642-38980
user authentication scheme for multi-gateway wireless sensor -1_18
networks. Ad Hoc Netw 54:147–169. https://doi.org/10.1016/j. Wu L, Zhang Y, Li L, Shen J (2016) Efficient and anonymous authen-
adhoc.2016.11.002 tication scheme for wireless body area networks. J Med Syst
Stallings W (2006) Cryptography and network security: principles and 40(6):134
practices. Pearson Education India, New York Zeinab KAM, Elmustafa SAA (2017) Internet of Things applications,
Styger E IoT security and the transport security layer. https://dzone. challenges and related future technologies. World Sci News
com/articles/iot-and-the-transport-security-layer 2(67):126–148
Tan H, Ma M, Labiod H, Boudguiga A, Zhang J, Chong PHJ (2016) Zhang Z, Qi Q (2014) An efficient RFID authentication protocol to
A secure and authenticated key management protocol (SA- enhance patient medication safety using elliptic curve cryptog-
KMP) for vehicular networks. IEEE Trans Veh Technol raphy. J Med Syst 38(5):47
65(12):9570–9584 Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anony-
Tiwari HD, Kim JH (2018) Novel method for DNA-based elliptic curve mous authentication scheme for roaming service in global mobil-
cryptography for IoT devices. ETRI J 40(3):396–409. https: //doi. ity networks. Wirel Pers Commun 78(1):247–269
org/10.4218/etrij.2017-0220 Zhao Z (2014) A secure RFID authentication protocol for healthcare
Tomar A, Dhar J (2019) An ECC based secure authentication and key environments using elliptic curve cryptosystem. J Med Syst
exchange scheme in multi-server environment. Wirel Pers Com- 38(5):46
mun 107(1):351–372 Zheng Y (1997) Digital signcryption or how to achieve cost (signa-
Verheyden L (2018) Effectiveness of threat modelling tools. Master ture and encryption) cost (signature) plus cost (encryption). In:
Thesis. https://lib.ugent.be/fulltxt/RUG01/002/508/960/ RUG01 Springer annual international cryptology conference. Springer,
-002508960_2018_0001_AC.pdf pp 165–179
Vermesan O, Friess P (2014) Internet of things-from research and inno- Zhu H (2003) A practical elliptic curve public key encryption scheme
vation to market deployment, vol 29. River Publishers, Aalborg provably secure against adaptive chosen-message attack. IACR
Visoottiviseth V, Akarasiriwong P, Chaiyasart S, Chotivatunyu S Cryptol ePrint Arch 2003:87
(2017) PENTOS: penetration testing tool for internet of thing Zolanvari M, Jain R (2015) IoT security: a survey
devices. In: TENCON 2017-2017 IEEE Region 10 conference,
IEEE, pp 2279–2284 Publisher’s Note Springer Nature remains neutral with regard to
Wang C, Zhang Y (2015) New authentication scheme for wireless body jurisdictional claims in published maps and institutional affiliations.
area networks using the bilinear pairing. J Med Syst 39(11):136
Wang J, Cheng LM (2017) Dynamic scalable ECC scheme and its
application to encryption workflow design. In: Proceedings of the
13