Explore chapters and articles related to this topic
Security and Privacy Aspects in the Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Published in Amit Kumar Tyagi, Niladhuri Sreenath, Handbook of Research of Internet of Things and Cyber-Physical Systems, 2022
Riral S. Trivedi, Sankita J. Patel
Literature mentions two types of cryptographic primitives: symmetric key cryptography and asymmetric key cryptography. Symmetric key cryptography functions on a single secret key for encryption and decryption processes. Asymmetric key cryptography functions with private and public key pairs for encryption and decryption. Symmetric key cryptography has smaller key size and faster processing, making it the most suitable option for IoT and CPS. Asymmetric key cryptography holds two pairs of long keys with heavy weight bilinear pairing operations which result in bottleneck due to excessive computational overhead [15]. It is proven that symmetric key cryptography is 1,000 times faster than strong public key ciphers [24]. To understand the viability of right approach, we highlight some limitations of these conventional techniques. Although the light-weight approach of a symmetric key makes it suitable for IoT and CPS, its major drawback that it works on a single secret key for both encryption and decryption. Locating the secret keys on any communication medium allows protocol security breach. The widely known encryption standard of symmetric key techniques are data encryption standard (DES), AES, Rivest cipher (RC4), RC5, RC6, and Blowfish [22, 24].
Applicability of Lightweight Stream Cipher in Crowd Computing: A Detailed Survey and Analysis
Published in Khan Pathan Al-Sakib, Crowd-Assisted Networking and Computing, 2018
Subhrajyoti Deb, Rohit Upadhya, Bubu Bhuyan
Cryptographic primitives are designed to deal with basic security issues, like confidentiality, integrity, authentication, and nonrepudiation. It can be classified into two categories: symmetric key and asymmetric key primitives. Symmetric key ciphers are again subdivided into two categories: block cipher and stream cipher. A stream cipher can generate cryptographically secure pseudorandom sequences. A pseudorandom number is highly preferable for encryption and decryption in cloud computing, WSNs, communication channels, and so on. A few prominent lightweight stream ciphers are Grain, WG, Trivium, SNOW, Salsa 20, Sprout, Espresso, Lizard, Fruit, and Plantlet. A lightweight stream cipher primarily consists of two components: key scheduling algorithm (KSA) and pseudorandom generation algorithm (PRGA). KSA increases the randomness properties inside the internal state of the stream cipher. PRGA always updates the internal state at every phase and after each update phase produces a keystream bit. A schematic diagram of the stream cipher keystream generation process is shown in Figure 9.2. A stream cipher is known as synchronous if the keystream is fully dependent on the secret key; otherwise, it is known as an asynchronous stream cipher. Usually, synchronous stream ciphers do not propagate any error transmission.
Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography
Published in Syed Ahson, Mohammad Ilyas, RFID Handbook, 2017
Damith C. Ranasinghe, Raja Ghosal, Alfio Grasso, Peter H. Cole
Cryptographic primitives form the building blocks of cryptographic systems (for instance the RSA cryptographic primitive is used for building public key ciphers). Primitives for lightweight cryptography must be generated using mathematical operations requiring a simple translation into digital circuit designs. The functions used should be such that complexity can be transferred to backend systems where bulk of the operations can take place, while the hardware on an RFID label is only required to perform a minimal level of computation.
A Survey of Interest Flooding Attack in Named-Data Networking: Taxonomy, Performance and Future Research Challenges
Published in IETE Technical Review, 2022
Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar
The cryptography approach is a method that working with a cryptographic primitive such as hashing, authenticate, digital signature, etc. The proposed security mechanism is at no hardware support and deploys verification or security algorithm to facilitate the detection. Aubrey and Refaei [48] introduced Cryptographic Route Tokens to neutralizing IFA in NDN. The route token contains all information required to route a data packet from a producer to consumer independently. The mechanism noted that the route tokens are used to eliminate the necessity of relying on the PIT. It might be used after the PIT reached a threshold size. The route token will independently suffice to remove the PIT state at any one hop. The attacks are launched with a symmetric-key authenticated token per-hop. It makes use of anonymous bloom filters that signed with RSA 512 bits. This method didn’t drop any legitimate Interests while route tokens are running within attacking volume. However, this solution is vulnerable to malicious memory consumption.