Literature Review on Lightweight Authentication Algorithms in Remote Data Transfer

Authors

  • Kalyankumar Dasari Research scholar, Department of Computer Science & Engineering, JNTUK, Andhra Pradesh, India
  • K. Sahadevaiah Professor, Department of Computer Science & Engineering, JNTUK, Andhra Pradesh, India

DOI:

https://doi.org/10.22399/ijcesen.954

Keywords:

Lightweight cryptography, Authentication, İntegrity, Smart Devices application

Abstract

With Smart Devices emerging as a potentially game-changing technology in the future, it is anticipated that it will generate a massive volume of data that may be vulnerable to security vulnerabilities. Therefore, lightweight cryptography has been identified as one of the acceptable mechanisms for protecting Smart Devices applications from hackers. This is since lightweight cryptography is designed to fulfill security demands in hardware and software that are resource constrained. When it comes to building lightweight cryptography for Smart Devices applications, specifically for integrity and authentication algorithms, the purpose of this study is to conduct an analysis of the existing security requirements. There was a four-step approach that was utilized to adopt the Kitchenham systematic review method. In this investigation, the articles that were chosen for research were retrieved from four credible databases, and after meeting the selection criteria, 57 of them were declared appropriate for subsequent analysis. A significant portion of the research was concentrated on assaults directed against Smart Devices applications, system security needs, and techniques for lightweight authentication. For the purpose of achieving the desired security requirements for sustainable security management in Smart Devices, this study may provide researchers with a reference for building user authentication algorithms that are lightweight.

References

Adnan Sohail, Abdul Hameed, Muhammad Farhan, Faiz Abdullah Alotaibi, And Mrim M. Alnfiai. (2023). Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-based Smart Home. IEEE Transations. 11: 137899-137910. DOI:10.1109/ACCESS.2023.3336763 DOI: https://doi.org/10.1109/ACCESS.2023.3336763

Sangjukta Das Patna, Maheshwari Prasad Singh , m Suyel Namasudra. (2023, July 14-16). A Lightweight Authentication and Key Agreement Protocol for IoT-based Smart Healthcare System. 2023 World Conference on Communication & Computing (WCONF) Raipur, India.

Sanaz Kavianpour Abdul Razaq Gavin Hales. (2023, 19-20 July). A secure lightweight authentication mechanism for IoT devices in generic domain. Proc. of the International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME 2023). Tenerife, Canary Islands, Spain. DOI: https://doi.org/10.1109/ICECCME57830.2023.10253392

B.D. Deebak, Fadi AL-Turjman. (2023). Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Generation Computer Systems. 116:406-425. DOI:10.1016/j.future.2020.11.010 DOI: https://doi.org/10.1016/j.future.2020.11.010

Abdulghani, H. A., Nijdam, N. A., Collen, A., Konstantas, D. (2019). A study on security and privacy guidelines, countermeasures, threats: Smart Devices Data at rest perspective. Symmetry. 11(6):774. DOI: 10.3390/sym11060774. DOI: https://doi.org/10.3390/sym11060774

Ahanger, T. A., Aljumah, A. (2019). Smart Devices: A comprehensive study of security issues and defense mechanisms. IEEE Access. 7:11020-11028. DOI: 10.1109/ access.2018.2876939. DOI: https://doi.org/10.1109/ACCESS.2018.2876939

Ahmed, A., Latif, R., Latif, S., Abbas, H., Khan, F. A. (2018). Malicious insiders attack in Smart Devices based Multi-Cloud e-Healthcare environment: A systematic literature review. Multimedia Tools and Applications. 77(17):21947-21965. DOI: 10.1007/s11042-017-5540-x. DOI: https://doi.org/10.1007/s11042-017-5540-x

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M. (2015). Smart Devices: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials. 17(4):2347-2376. DOI: 10.1109/ comst.2015.2444095. DOI: https://doi.org/10.1109/COMST.2015.2444095

Alam, S., Siddiqui, S. T., Ahmad, A., Ahmad., R., Shuaib, M. (2020). Smart Devices enabling technologies, requirements, and security challenges. In Advances in data and information sciences. 119-126. Berlin/Heidelberg, Germany: Springer. DOI: https://doi.org/10.1007/978-981-15-0694-9_12

Aleisa, N., Renaud, K. (2017). Privacy of the Smart Devices: A systematic literature review. Proceedings of the 50th Hawaii International Conference on System Sciences. DOI: 10.24251/ hicss.2017.717 DOI: https://doi.org/10.24251/HICSS.2017.717

Almulhim, M., Islam, N., Zaman, N. (2019). A lightweight and secure authentication scheme for Smart Devices based e-health applications. International Journal of Computer Science and Network Security. 19(1):107-120.

Aswale, P., Shukla, A., Bharati, P., Bharambe, S., Palve, S. (2019). An overview of Smart Devices: Architecture, protocols and challenges. In Information and communication technology for Intelligent Systems. 299-308. Berlin/Heidelberg, Germany: Springer. DOI: https://doi.org/10.1007/978-981-13-1742-2_29

Azni, A. H., Ahmad, R., Noh, Z. (2013). Survivability modeling and analysis of mobile ad hoc network with correlated node behavior. Procedia Engineering. 53:435-440. DOI:10.1016/j.proeng.2013.02.057 DOI: https://doi.org/10.1016/j.proeng.2013.02.057

Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia-Social and Behavioral Sciences. 195:1872-1881. DOI:10.1016/j.sbspro.2015.06.424 DOI: https://doi.org/10.1016/j.sbspro.2015.06.424

Bansal, S., Kumar, D. (2020). Smart Devices Ecosystem:A survey on devices, gateways, operating systems. Middleware and Communication. International Journal of Wireless Information Networks. 27(4):1-25. DOI:10.1007/s10776-020-00483-7 DOI: https://doi.org/10.1007/s10776-020-00483-7

Blackburn, S. R., Robshaw, M. J. (2016). On the security of the Algebraic Eraser Tag Authentication Protocol. Applied Cryptography and Network Security Lecture Notes in Computer Science. 3-17. DOI: 10.1007/978-3-319-39555-5_1 DOI: https://doi.org/10.1007/978-3-319-39555-5_1

Bösch, C., Guajardo, J., Sadeghi, A., Shokrollahi, J., Tuyls, P. (2008). Efficient Helper Data Key Extractor on FPGAs. Cryptographic Hardware and Embedded Systems– CHES 2008 Lecture Notes in Computer Science. 181-197. DOI: 10.1007/978-3-540-85053-3_12 DOI: https://doi.org/10.1007/978-3-540-85053-3_12

Brinkmann, A., Fiehe, C., Litvina, A., Luck, I., Nagel, L., Narayanan, K., Ostermair, F., Thronicke, W. (2013). Scalable Monitoring System for Clouds. In Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, Dresden, Germany. 9-12. DOI: https://doi.org/10.1109/UCC.2013.103

Cai, H., Xu, B., Jiang, L., Vasilakos, A.V. (2016). Smart Devices-based Big Data Storage Systems in Cloud Computing: Perspectives and challenges. IEEE Internet Things Journal. 4:75-87. DOI: https://doi.org/10.1109/JIOT.2016.2619369

Cherdantseva, Y., Hilton, J. (2013). A reference model of information assurance and security. 2013 International Conference on Availability, Reliability and Security. DOI: 10.1109/ares.2013.72 DOI: https://doi.org/10.1109/ARES.2013.72

Claycomb, W. R., Nicoll, A. (2012). Insider threats to Cloud Computing: Directions for new research challenges. 2012 IEEE 36th Annual Computer Software and Applications Conference. DOI: 10.1109/ compsac.2012.113 DOI: https://doi.org/10.1109/COMPSAC.2012.113

Columbus, L. (2017, December 11). 2017 Roundup of Smart Devices Forecasts. Forbes. https://www.forbes.com/sites/louiscolumbus/2017/12/10/2017-roundup-of-internet-of-things-forecasts/?sh=3d933e2f 1480. Access on 15 May 2021.

Das, A. K., Zeadally, S., He, D. (2018). Taxonomy and analysis of security protocols for Smart Devices. Future Generation Computer System. 89:110-125. DOI:10.1016/j.future.2018.06.027 DOI: https://doi.org/10.1016/j.future.2018.06.027

Davoli, L., Veltri, L., Ferrari, G., Amadei, U. (2019). Smart Devices on Power Line Communications: An experimental performance analysis. In Kabalci, E., Kabalci, Y., (Eds.), Smart grids and their communication systems. 465-498. Singapore: Springer. DOI: https://doi.org/10.1007/978-981-13-1768-2_13

Deep, S., Zheng, X., Hamey, L. (2019). A survey of security and privacy issues in the Smart Devices from the layered context. arXiv 2019. arXiv: 1903.00846.

Delvaux, J., Gu, D., Verbauwhede, I., Hiller, M., Yu, M. D. (2016). Efficient fuzzy extraction of PUF-Induced Secrets: Theory and applications. Lecture Notes in Computer Science Cryptographic Hardware and Embedded Systems – CHES 2016. 412-431. DOI: 10.1007/978-3-662-53140-2_20. DOI: https://doi.org/10.1007/978-3-662-53140-2_20

Dhumane, A., Prasad, R., Prasad, J. (2016). Routing issues in Smart Devices: A survey. In Proceedings of the International Multiconference of Engineers and Computer Scientists, Hong Kong. 1:13-20.

Dybå, T., Dingsøyr, T. (2008). Empirical studies of Agile Software Development: A systematic review. Information and Software Technology. 50(9-10):833-859. DOI:10.1016/j.infsof.2008.01.006 DOI: https://doi.org/10.1016/j.infsof.2008.01.006

Grobauer, B., Walloschek, T., Stöcker, E. (2013). Understanding Cloud Computing Vulnerabilities. IEEE Security and Privacy. 9:50-57. DOI: 10.1109/MSP.2010.115. DOI: https://doi.org/10.1109/MSP.2010.115

Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Smart Devices: A vision, architectural elements, and future directions. Future Generation Computer System. 29:1645-1660. DOI:10.1016/j.future.2013.01.010 DOI: https://doi.org/10.1016/j.future.2013.01.010

Hameed, S., Khan, F. I., Hameed, B. (2019). Understanding security requirements and challenges in Smart Devices: A review. Journal Computer Network Communication. 11:1-14. DOI:10.1155/2019/9629381 DOI: https://doi.org/10.1155/2019/9629381

Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P. (2017). A Lightweight Mutual Authentication Protocol for the Smart Devices. In International Conference on Mobile and Wireless Technology. 3-12. Singapore: Springer. DOI: https://doi.org/10.1007/978-981-10-5281-1_1

Harnik, D., Pinkas, B., Shulman-Peleg, A. (2017). Side channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security and Privacy. 8:40-47. DOI: 10.11 09/MSP.2010.187 DOI: https://doi.org/10.1109/MSP.2010.187

Hasan, M., Mohan, S. (2019). Protecting actuators in Safety-Critical Smart Devices Systems from control spoofing attacks. In Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things. 8-14. DOI:10.1145/3338507.3358615 DOI: https://doi.org/10.1145/3338507.3358615

Herder, C., Yu, M. D., Koushanfar, F., Devadas, S. (2014). Physical unclonable functions and applications: A tutorial. In Proceedings of the IEEE. 102(8):1126-1141. DOI:10.1109/JPROC.2014.2320516 DOI: https://doi.org/10.1109/JPROC.2014.2320516

He, D., Zeadallyn, S. (2015). An analysis of RFID Authentication Schemes for Smart Devices in healthcare environment using Elliptic Curve Cryptography. IEEE Smart Devices Journal. 2(1):72-83. DOI:10.1109/JIOT.2014.2360121 DOI: https://doi.org/10.1109/JIOT.2014.2360121

Kaaniche, N., Laurent, M. (2017). Data security and privacy preservation in Cloud Storage environments based on cryptographic mechanisms. Computer Communications. 111:120-141. DOI: 10.10 16/j.comcom.2017.07.006. DOI: https://doi.org/10.1016/j.comcom.2017.07.006

Khammash, M., Tammam, R., Masri, A., Awad, A. (2021). Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks. In 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD). 63-69. IEEE. DOI: https://doi.org/10.1109/SSD52085.2021.9429526

Kitchenham, B. (2004). Procedures for Performing Systematic Reviews. 33(2004):1-26. Keele, UK: Keele University.

Køien, G. M. (2011). Reflections on trust in devices: An informal survey of human trust in an Smart Devices context. Wireless Personal Communications. 61(3):495-510. DOI:10.1007/s11277-011-0386-4 DOI: https://doi.org/10.1007/s11277-011-0386-4

Kothmayr, Thomas. (2013). DTLS based security and two-way authentication for The Smart Devices. Ad Hoc Networks. 11(8):2710-2723. DOI:10.1016/j.adhoc.2013.05.003 DOI: https://doi.org/10.1016/j.adhoc.2013.05.003

Kumar, P. R., Raj, P. H., Jelciana, P. (2018). Exploring data security issues and solutions in Cloud Computing. Procedia Computer Science. 125:691-697. DOI: 10.1016/j. procs.2017.12.089 DOI: https://doi.org/10.1016/j.procs.2017.12.089

Lai, C., Li, H., Lu, R., Shen, X. S. (2013). A secure and efficient Group Authentication and Key Agreement Protocol for LTE Networks. Computer Network. 57:3492-3510. DOI:10.1016/j.comnet.2013.08.003 DOI: https://doi.org/10.1016/j.comnet.2013.08.003

Lara-Nino, C. A., Diaz-Perez, A., Morales-Sandoval, M. (2018). Elliptic curve lightweight cryptography: A survey. IEEE Access. 6:72514-72550. DOI: 10.1109/ACCESS.2018.2881444 DOI: https://doi.org/10.1109/ACCESS.2018.2881444

Lee, J. Y. (2017). A lightweight authentication protocol for Smart Devices. In International Symposium on Next-Generation Electronics, Kwei-Shan.

Li, F., Lai, A., Ddl, D. (2013). Evidence of Advanced Persistent Threat: A case study of malware for Political Espionage. Malicious and Unwanted Software (MALWARE). 2013 6th International Conference on IEEE. 102-109. DOI:10.1109/MALWARE.2011.6112333 DOI: https://doi.org/10.1109/MALWARE.2011.6112333

Li, N., Liu, D., Nepal, S. (2017). Lightweight Mutual Authentication for Smart Devices and its applications. IEEE Transactions on Sustainable Computing. 2(4):359-370. DOI: 10.1109/TSUSC.2017.2716953 DOI: https://doi.org/10.1109/TSUSC.2017.2716953

Li, Y., Gao, M., Yang, L., Zhang, C., Zhang, B., Zhao, X. (2020). Design of and research on Industrial Measuring Devices based on Smart Devices technology. Ad Hoc Networks. 102:102072. DOI: https://doi.org/10.1016/j.adhoc.2020.102072

Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J. (2015). Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on Cloud. IEEE Transanctions on Computers. 64:2609-2622. DOI: 10.1109/ TC.2014.2375190 DOI: https://doi.org/10.1109/TC.2014.2375190

Liu, X., Zhao, M., Li, S., Zhang, F., Trappe. (2017). W. A security framework for the Smart Devices in the future Internet architecture. Future Internet. 9(3):1-27. DOI:10.3390/fi9030027 DOI: https://doi.org/10.3390/fi9030027

Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I. (2016) Smart Devices: Vision, applications and research challenges. Ad Hoc Networks. 10(7):1497-1516. DOI:10.1016/j.adhoc.2012.02.016 DOI: https://doi.org/10.1016/j.adhoc.2012.02.016

Mohsen, N. A., Jha, N. K. (2016). A comprehensive study of security of Internet-of-Things. IEEE Transanctions on Emerging Topics in Computing. 5:586-602. DOI:10.1109/TETC.2016.2606384 DOI: https://doi.org/10.1109/TETC.2016.2606384

Nicanfar, H., Jokar, P., Beznosov, K., Leung, V. C. M. (2014). Efficient authentication and key management mechanisms for smart grid communications. IEEE System Journal. 8:629-640. DOI:10.1109/JSYST.2013.2260942 DOI: https://doi.org/10.1109/JSYST.2013.2260942

Pal, S., Hitchens, M., Varadharajan, V. (2018). Modeling identity for the Smart Devices: Survey, classification and trends. In Proceedings of the 2018 12th International Conference on Sensing Technology (ICST), Limerick, Ireland. 45-51. DOI:10.1109/ICSensT.2018.8603595 DOI: https://doi.org/10.1109/ICSensT.2018.8603595

Rashid, F., Miri, A., Woungang, I. (2012). A secure data deduplication framework for Cloud environments. In Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust, Paris, France. 81-87. DOI: 10.1109/ PST.2012.6297923 DOI: https://doi.org/10.1109/PST.2012.6297923

Roman, R., Zhou, J., Lopez, J. (2013). On the features and challenges of security and privacy in distributed Smart Devices. Computer Networks. 57(10):2266-2279. DOI:10.1016/j.comnet.2012.12.018 DOI: https://doi.org/10.1016/j.comnet.2012.12.018

Salleh, N., Mendes, E., Grundy, J. (2013). The effects of openness to experience on pair programming in a Higher Education context. In 2013 24th IEEE-CS Conference on Software Engineering Education and Training (CSEE&T). 149-158. DOI:10.1109/CSEET.2011.5876082 DOI: https://doi.org/10.1109/CSEET.2011.5876082

Schmitt, C., Noack, M., Stiller, B., Tiny, T. O. (2016). Two-way authentication for constrained devices in the Smart Devices. In Smart Devices. Amsterdam, The Netherlands: Elsevier. 239-258. DOI: https://doi.org/10.1016/B978-0-12-805395-9.00013-7

Shahbodin, F., Azni, A. H., Ali, T., Mohd, C. K. N. C. K. (2019, January). Lightweight cryptography techniques for MHealth cybersecurity. In Proceedings of the 2019 Asia Pacific Information Technology Conference. 44-50. DOI:10.1145/3314527.3314536 DOI: https://doi.org/10.1145/3314527.3314536

Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., Yim. K. (2018). A framework for Mitigating Zero-Day Attacks in Smart Devices. arXiv 2018. arXiv: 1804.05549

Shen, J., Yang, H., Wang, A., Zhou, T., Wang, C. (2019). Lightweight Authentication and Matrix-Based Key Agreement Scheme for Healthcare in Fog Computing. Peer-to-Peer Network Application. 12(4):924-933. DOI:10.1007/s12083-018-0696-3 DOI: https://doi.org/10.1007/s12083-018-0696-3

Sicari, S., Rizzardi, A., Grieco, L. A. (2015). A security, privacy and trust in Smart Devices: The road ahead. Computer Network. 76:146-164. DOI:10.1016/j.comnet.2014.11.008 DOI: https://doi.org/10.1016/j.comnet.2014.11.008

Singh, A., Chatterjee, K. (2015). A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment. In Proceedings of the 2015 International Conference on Circuits. Power and Computing Technologies [ICCPCT-2015], Nagercoil, India. DOI:10.1109/ICCPCT.2015.7159276 DOI: https://doi.org/10.1109/ICCPCT.2015.7159276

Singh, S., Sharma, P. K., Moon, S. Y., Park, J. H. (2017). Advanced lightweight encryption algorithms for Smart Devices devices: Survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. 15(2):1-18. DOI:10.1007/s12652-017-0494-4 DOI: https://doi.org/10.1007/s12652-017-0494-4

Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., Choo, K. K. R. (2020). A systematic literature review of Blockchain Cyber Security. Digital Communications and Networks. 6(2):147-156. DOI:10.1016/j.dcan.2019.01.005 DOI: https://doi.org/10.1016/j.dcan.2019.01.005

Turkanovi, M. (2014). A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, based on the Smart Devices Notion. Ad Hoc Networks. 20:96-112. DOI:10.1016/j.adhoc.2014.03.009 DOI: https://doi.org/10.1016/j.adhoc.2014.03.009

Wendt, J. B., Potkonjak, M. (2014). Hardware Obfuscation Using PUF-Based Logic. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 270-271. DOI: https://doi.org/10.1109/ICCAD.2014.7001362

Williams, Patricia, A. H., Vincent. M. (2016). Always connected: The security challenges of the healthcare Smart Devices. IEEE 3rd World Forum on Smart Devices (WF-Smart Devices). DOI: 10.1109/wf-Smart Devices.2016.7845455 2 DOI: https://doi.org/10.1109/WF-IoT.2016.7845455

Wu, Z. Q. (2017). A Security Transmission Model for Smart Devices. Chinese Journal of Computers. 34(8):1351-1364. DOI:10.3724/SP.J.1016.2011.01351 DOI: https://doi.org/10.3724/SP.J.1016.2011.01351

Yanling, Z. (2013). Research on Data Security Technology in Smart Devices. Applied Mechanics and Materials. 433-435, 1752-155. DOI: https://doi.org/10.4028/www.scientific.net/AMM.433-435.1752

Yaqoob, I., Hashem, I. A. T., Ahmed, A., Kazmi, S. A. (2019). Smart Devices Forensics: Recent advances, taxonomy, requirements, and open challenges. Future Generations Computer System. 92:265-275. DOI:10.1016/j.future.2018.09.058 DOI: https://doi.org/10.1016/j.future.2018.09.058

Ye, N., Zhu, Y., Wang, R. C., Malekian, R., Qiao-min, L. (2014). An efficient authentication and access control scheme for perception layer of Smart Devices. Applied Mathematics & Information Sciences. 8(4):1617-1624. DOI:10.12785/amis/080416 DOI: https://doi.org/10.12785/amis/080416

Yu, S., Guo, S. (2016). Big data concepts, theories, and applications. Cham, Switzerland: Springer International Publishing. 1-437. DOI: 10.1007/978-3-319-27763-9 DOI: https://doi.org/10.1007/978-3-319-27763-9

Downloads

Published

2025-03-05

How to Cite

Dasari, K., & K. Sahadevaiah. (2025). Literature Review on Lightweight Authentication Algorithms in Remote Data Transfer. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.954

Issue

Section

Review Article