Lightweight Encryption for the Low Powered IoT Devices
Abstract
The internet of things refers to the network of devices connected to the internet and can communicate with each other. The term things is to refer non-conventional devices that are usually not connected to the internet. The network of such devices or things is growing at an enormous rate. The security and privacy of the data flowing through these things is a major concern. The devices are low powered and the conventional encryption algorithms are not suitable to be employed on these devices. In this correspondence a survey of the contemporary lightweight encryption algorithms suitable for use in the IoT environment has been presented.
Index Terms:
Internet of things, privacy, security, IoTI Introduction
The internet of things makes use of the existing global internet infra-structure in order to connect the physical objects including devices, home appliances and vehicles to name a few. The traditional fields of embedded systems including the Radio-frequency identification (RFID), wireless sensor networks (WSN) have all contributed towards building up and empower the IoT. The IoT enables the objects and sensors to be identified uniquely on the network and there are billions of such devices interconnected to each other. According to an estimate, a revenue of more than billion will be generated by the year with more than billion connected devices to the internet [1, 2]. The IoT is focused towards creating smart environments and autonomous devices for use in constructing smart cities, smart transportation and smart hospitals [3, 4]. New IoT applications are introduced at a high pace, and the are generating huge amount of data that can have security and privacy threat. Billions of devices connected to each other shall pronounce the security related issues and shall expose the weaknesses in the infrastructure. It has been predicted that if the security measures are not taken into account, the attacks and malfunctions would outweigh the advantages of IoT applications [5]. The things in the IoT environment are constrained due to the limited battery life, size and computation, therefore, they cannot support the existing security solutions. The traditional cryptography algorithms and security schemes are insufficient for the ever evolving IoT applications which require scalable and robust solutions [6, 7, 8]. This requires the development of novel designs and architectures to effectively deal with the security and privacy issues suitable for the resource constrained devices in the IoT [9, 10, 11]. This correspondence is aimed to review the security and privacy challenges in the IoT and survey the contemporary lightweight cryptographic algorithms developed for the resource constrained devices.
II Security and Privacy Challenges in IoT
One of the aspect towards deployment of IoT at the root level is to ensure its security. The proposed security solution must consider the resource constrained devices i.e. they must be lightweight and should consume less memory and computation power. Some of the lightweight solutions presented recently does not take into consideration the inter-operability and integration into the IoT. The interconnected devices have varied computational capacity and operate on diversified protocols, thus the security models must operate on the global standards [12]. Another issue in the IoT is that of the privacy, which is the privilege of an individual or a device to define the extent to which their data will be presented or shared with other elements on the network. In the present situation where a large amount of data is generated and is available on the network, the individual must have appropriate control of their data that can be accessed by other entities. A framework for the privacy support is yet to be developed by the researchers that will provide scalability in the IoT. In the following section, the security and privacy challenges are explicitly discussed.
II-A Security in IoT
The security refers to the protection of the devices and data in the IoT. Different layers of IoT can be protected by implying different security technologies. Some of the important security aspects in the IoT are authentication, confidentiality, integrity and availability.
II-A1 Authentication
Authentication is vital requirement in the IoT, as it is sorely required to keep the information away from the unauthorized devices and person. Traditionally, the internet users authenticate themselves using the Secure Socket Layers (SSL) through their browsers, where they present a secret key (passwords). However, the mechanism of the passwords in the automated IoT environment does not present a good solution. In the IoT, the devices are usually connected to a central hub or gateway. Since the gateway is responsible for the information exchange between the devices and cloud, the authentication can be implied at the gateway to ensure the information is transmitted to the authenticated device or user. By following proper authentication protocols, it can be guaranteed that the information shall not land into wrong hands. For the scenarios in the absence of gateway, where the sensors themselves are responsible for the information exchange to and from the cloud, lightweight authentication protocols are highly desirable [13, 14, 15].
II-A2 Confidentiality
The exchange of the private information between the billions of IoT devices and their storage must possess confidentiality [16]. The components in the IoT collaborating with each other in order to provide the desired service, are vulnerable to the confidentiality attacks if an unauthorized access is made to the sensitive information. Confidentiality being a primary concern, can be ensured by employing an access control method or using a lightweight encryption scheme.
II-A3 Integrity
Integrity refers to the protected data that is transmitted in its original form, without being altered by the cyber criminals. Error detection techniques such as cyclic redundancy check (CRC) can be utilized to ensure the uniqueness of the message. Furthermore, Secure Hash Algorithm (SHA) are also regularly used which is a mathematical algorithm to ensure the elements of the data are unchanged. Suitable frameworks to provide integrity in the IoT environment are thoroughly discussed in [17].
II-A4 Availability
In the IoT, the data must be available at all times to the authorized users. Back-end cloud and storage devices must present the data, software service and hardware whenever required. The software availability refers to the service that has been given to the user to access or modify the information, whereas the hardware availability refers to the availability of the gadgets and their access.
II-B Privacy
The objects or things in the IoT tends to communicate the data autonomously, therefore, the the information is vulnerable to attacks and threat. It is highly desirable that the information is kept safe during the autonomous transfer by ensuring the privacy. The end-to-end transfer of information is somewhat immune to the attacks, however, the communication made via variety of nodes and sensors is highly susceptible to privacy breach. Large amount of data being shared and collected in different IoT technologies, is often human centered. A person or the entity must verify the amount of information they are willing to share to others. In the later section we review some of the cryptography algorithms that are tailored for the resource constrained devices and gadgets utilized in the IoT.
III Lightweight Cryptography for IoT
Two types of cryptography algorithms exists; symmetric and asymmetric, they differ from each other on the basis of key that is used for encryption and decryption. The symmetric ciphers use same key for the encryption and decryption, on the other hand, the asymmetric ciphers makes use of a public and private key for the sake of encrypting and decrypting the data. The lightweight encryption algorithms commonly utilize the symmetric key algorithms since the large key sizes in the asymmetric algorithms are not suitable for the IoT. Another feature of using Feistel network in the symmetric key algorithms is that the encryption and decryption process are complement of each other, which reduces their code size and saves the memory and circuit of the constrained device and results in the reduced latency. The symmetric encryption algorithms however, can be use either block or stream methods to generate the cipher text. The block cipher accepts a fixed length block of input bits as the plain text and performs transformation according the key. They are usually composed of substitution and permutation network (SPN) which contains substitution boxes and permutation boxes to generate the cipher text from the plain text. Symmetric algorithms employing a Feistel network for the encryption of the data can utilize similar structure for encryption and decryption. Some of the lightweight encryption algorithm are discussed in the following. In the following, we shall discuss about the recently proposed lightweight symmetric block ciphers that can be utilized in the IoT.
III-A PRESENT
PRESENT [18] was developed for the resource constrained devices having a block size of bits. The algorithm was synthesized to examine the resource and power consumption, and it was observed that it requires clock cycles to encrypt the -bit plain text with -bit key. It occupies gate equivalents (GE) which is suitable for the devices with limited resource. The number of rounds to encrypt or decrypt the data is which involves substitution and permutation of the plain text. The substitution and permutation network of the algorithm is shown in Figure 1.

III-B KATAN
This cipher was developed for the resource constrained devices and consumes % less resources than PRESENT [19]. The key scheduling is simple which is of -bits and is generated using the Feistel structure to encrypt -bits, -bits or -bits of plain text. The shortcoming of the KATAN cipher is the number of rounds it takes to generate the cipher text. With rounds to generate on block of cipher text, the energy consumption is very high an throughput is low. On of the rounds of KATAN is shown in Figure 2

III-C Humming Bird
Humming Bird was presented as an ultra-lightweight cryptographic algorithm for the resource constrained devices such as smart cards and RFID tags [20]. It uses -bit key to encrypt the -bit block of plain text. The algorithm was implemented on a -bit micro-controller and achieved better results in terms of throughput when compared to PRESENT. Since it uses separate functions for encryption and decryption, the resource footprint is larger.
III-D SIMON and SPECK
The SIMON and SPECK were proposed as a lightweight cryptography algorithms in [21]. They were developed by the National Security Agency (NSA) in the U.S. as an optimized algorithms for implementation in hardware and software. They require atleast rounds to encrypt the data and the number of mathematical operations are quite high.
III-E RECTANGLE
Bit-slice technique was utilized to make the algorithm lightweight and make the implementation faster. It uses the substitution and permutation networks to generate the cipher text in which the S-boxes are implemented in parallel whereas the permutation block uses rotations. For -key, it requires gates and which when implemented in parallel, yields a throughput of Kbits/sec at KHz clock. The datapath of the algorithm is depicted in Figure 3

III-F SIT
A lightweight algorithm for the power constrained IoT devices named as SIT was proposed in [22]. It is a combination of Feistel and SP network and therefore, can withstand the attacks on the resource constrained devices. It uses only rounds for encryption/decryption, and works on the block sizes of -bits with key size of the same size. It is composed of two modules namely; key expansion and encryption, which are used for the key generation and data encryption respectively. The operations the key expansion involve XOR, concatenation, addition and shifting. The F-function shown in Figure 4 used in both key expansion and encryption/decryption block is inspired by the Khazad block cipher and performs the linear and non-linear transformation to remove any dependency of the output bits on the input bits [23]. This algorithm has been implemented on a low cost micro-controller on which it consumed only bytes of RAM, and clock cycles for encryption and decryption respectively. Furthermore, recently the FPGA implementation of the algorithm showed that a high throughput of upto can be achieved which is % more than the LEA cipher [24].

IV Conclusion
Security and privacy are the vital elements in the communication, and they are given more attention in the IoT because the data is usually human centered. The resource constrained devices in the IoT cannot utilize the state-of-the-art encryption algorithms, thus the development of lightweight encryption algorithm is indispensable. In this correspondence the contemporary lightweight block ciphers have been studied.
References
- [1] O. Vermesan and P. Friess, Internet of things: converging technologies for smart environments and integrated ecosystems. River publishers, 2013.
- [2] H. Okkonen, O. Mazhelis, P. Ahokangas, P. Pussinen, M. Rajahonka, R. Siuruainen, S. Leminen, A. Shveykovskiy, J. Myllykoski, and H. Warma, “Internet-of-things market, value networks, and business models: state of the art report,” Computer science and information systems reports. TR, Technical reports, no. 39, 2013.
- [3] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad hoc networks, vol. 10, no. 7, pp. 1497–1516, 2012.
- [4] A. Whitmore, A. Agarwal, and L. Da Xu, “The internet of things—a survey of topics and trends,” Information systems frontiers, vol. 17, no. 2, pp. 261–274, 2015.
- [5] R. Roman, P. Najera, and J. Lopez, “Securing the internet of things,” Computer, vol. 44, no. 9, pp. 51–58, 2011.
- [6] G. Yang, J. Xu, W. Chen, Z.-H. Qi, and H.-Y. Wang, “Security characteristic and technology in the internet of things,” Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban)/ Journal of Nanjing University of Posts and Telecommunications(Natural Nanjing University of Posts and Telecommunications(Natural, vol. 30, no. 4, 2010.
- [7] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review,” in 2012 international conference on computer science and electronics engineering, vol. 3. IEEE, 2012, pp. 648–651.
- [8] U. e Rabab, I. Ahmed, M. I. Aslam, and M. Usman, “Fpga implementation of secure internet of things (sit) algorithm for high throughput area ratio,” International Journal of Future Generation Communication and Networking, vol. 11, no. 5, pp. 63–72, 2018.
- [9] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE communications surveys & tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
- [10] M. S. Ibrahim, I. Ahmed, M. I. Aslam, M. Ghazaal, M. Usman, K. Raza, and S. Khan, “A low cost fpga based cryptosystem design for high throughput area ratio,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, 2017. [Online]. Available: http://dx.doi.org/10.14569/IJACSA.2017.080249
- [11] M. Usman, S. Z. Abidi, M. H. S. Siddiqui, and M. S. Ibrahim, “Implementation of secure force (64-bit) on low cost 8-bit microcontroller,” in 2016 International Conference on Open Source Systems Technologies (ICOSST), 2016, pp. 102–105.
- [12] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.
- [13] A.-T. Fadi and D. B. David, “Seamless authentication: For iot-big data technologies in smart industrial application systems,” IEEE Transactions on Industrial Informatics, 2020.
- [14] M. Dammak, O. R. M. Boudia, M. A. Messous, S. M. Senouci, and C. Gransart, “Token-based lightweight authentication to secure iot networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2019, pp. 1–4.
- [15] M. Walshe, G. Epiphaniou, H. Al-Khateeb, M. Hammoudeh, V. Katos, and A. Dehghantanha, “Non-interactive zero knowledge proofs for the authentication of iot devices in reduced connectivity environments,” Ad Hoc Networks, vol. 95, p. 101988, 2019.
- [16] N. Boltz, M. Walter, and R. Heinrich, “Context-based confidentiality analysis for industrial iot,” in 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, 2020, pp. 589–596.
- [17] M. M. Dhanvijay and S. C. Patil, “Internet of things: A survey of enabling technologies in healthcare and its applications,” Computer Networks, vol. 153, pp. 113–131, 2019.
- [18] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin, and C. Vikkelsoe, “Present: An ultra-lightweight block cipher,” in International workshop on cryptographic hardware and embedded systems. Springer, 2007, pp. 450–466.
- [19] C. De Canniere, O. Dunkelman, and M. Knežević, “Katan and ktantan—a family of small and efficient hardware-oriented block ciphers,” in International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2009, pp. 272–288.
- [20] D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, “Hummingbird: ultra-lightweight cryptography for resource-constrained devices,” in International Conference on Financial Cryptography and Data Security. Springer, 2010, pp. 3–18.
- [21] R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, “The simon and speck families of lightweight block ciphers.” IACR Cryptol. ePrint Arch., vol. 2013, p. 404, 2013.
- [22] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “Sit: A lightweight encryption algorithm for secure internet of things,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, 2017. [Online]. Available: http://dx.doi.org/10.14569/IJACSA.2017.080151
- [23] P. Barreto and V. Rijmen, “The khazad legacy-level block cipher,” Primitive submitted to NESSIE, vol. 97, p. 106, 2000.
- [24] Z. Mishra, S. Mishra, and B. Acharya, “High throughput novel architecture of sit cipher for iot application,” in Nanoelectronics, Circuits and Communication Systems. Springer, 2020, pp. 267–276.