Literature Review on Lightweight Authentication Algorithms in Remote Data Transfer
DOI:
https://doi.org/10.22399/ijcesen.954Keywords:
Lightweight cryptography, Authentication, İntegrity, Smart Devices applicationAbstract
With Smart Devices emerging as a potentially game-changing technology in the future, it is anticipated that it will generate a massive volume of data that may be vulnerable to security vulnerabilities. Therefore, lightweight cryptography has been identified as one of the acceptable mechanisms for protecting Smart Devices applications from hackers. This is since lightweight cryptography is designed to fulfill security demands in hardware and software that are resource constrained. When it comes to building lightweight cryptography for Smart Devices applications, specifically for integrity and authentication algorithms, the purpose of this study is to conduct an analysis of the existing security requirements. There was a four-step approach that was utilized to adopt the Kitchenham systematic review method. In this investigation, the articles that were chosen for research were retrieved from four credible databases, and after meeting the selection criteria, 57 of them were declared appropriate for subsequent analysis. A significant portion of the research was concentrated on assaults directed against Smart Devices applications, system security needs, and techniques for lightweight authentication. For the purpose of achieving the desired security requirements for sustainable security management in Smart Devices, this study may provide researchers with a reference for building user authentication algorithms that are lightweight.
References
Adnan Sohail, Abdul Hameed, Muhammad Farhan, Faiz Abdullah Alotaibi, And Mrim M. Alnfiai. (2023). Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-based Smart Home. IEEE Transations. 11: 137899-137910. DOI:10.1109/ACCESS.2023.3336763 DOI: https://doi.org/10.1109/ACCESS.2023.3336763
Sangjukta Das Patna, Maheshwari Prasad Singh , m Suyel Namasudra. (2023, July 14-16). A Lightweight Authentication and Key Agreement Protocol for IoT-based Smart Healthcare System. 2023 World Conference on Communication & Computing (WCONF) Raipur, India.
Sanaz Kavianpour Abdul Razaq Gavin Hales. (2023, 19-20 July). A secure lightweight authentication mechanism for IoT devices in generic domain. Proc. of the International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME 2023). Tenerife, Canary Islands, Spain. DOI: https://doi.org/10.1109/ICECCME57830.2023.10253392
B.D. Deebak, Fadi AL-Turjman. (2023). Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Generation Computer Systems. 116:406-425. DOI:10.1016/j.future.2020.11.010 DOI: https://doi.org/10.1016/j.future.2020.11.010
Abdulghani, H. A., Nijdam, N. A., Collen, A., Konstantas, D. (2019). A study on security and privacy guidelines, countermeasures, threats: Smart Devices Data at rest perspective. Symmetry. 11(6):774. DOI: 10.3390/sym11060774. DOI: https://doi.org/10.3390/sym11060774
Ahanger, T. A., Aljumah, A. (2019). Smart Devices: A comprehensive study of security issues and defense mechanisms. IEEE Access. 7:11020-11028. DOI: 10.1109/ access.2018.2876939. DOI: https://doi.org/10.1109/ACCESS.2018.2876939
Ahmed, A., Latif, R., Latif, S., Abbas, H., Khan, F. A. (2018). Malicious insiders attack in Smart Devices based Multi-Cloud e-Healthcare environment: A systematic literature review. Multimedia Tools and Applications. 77(17):21947-21965. DOI: 10.1007/s11042-017-5540-x. DOI: https://doi.org/10.1007/s11042-017-5540-x
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M. (2015). Smart Devices: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials. 17(4):2347-2376. DOI: 10.1109/ comst.2015.2444095. DOI: https://doi.org/10.1109/COMST.2015.2444095
Alam, S., Siddiqui, S. T., Ahmad, A., Ahmad., R., Shuaib, M. (2020). Smart Devices enabling technologies, requirements, and security challenges. In Advances in data and information sciences. 119-126. Berlin/Heidelberg, Germany: Springer. DOI: https://doi.org/10.1007/978-981-15-0694-9_12
Aleisa, N., Renaud, K. (2017). Privacy of the Smart Devices: A systematic literature review. Proceedings of the 50th Hawaii International Conference on System Sciences. DOI: 10.24251/ hicss.2017.717 DOI: https://doi.org/10.24251/HICSS.2017.717
Almulhim, M., Islam, N., Zaman, N. (2019). A lightweight and secure authentication scheme for Smart Devices based e-health applications. International Journal of Computer Science and Network Security. 19(1):107-120.
Aswale, P., Shukla, A., Bharati, P., Bharambe, S., Palve, S. (2019). An overview of Smart Devices: Architecture, protocols and challenges. In Information and communication technology for Intelligent Systems. 299-308. Berlin/Heidelberg, Germany: Springer. DOI: https://doi.org/10.1007/978-981-13-1742-2_29
Azni, A. H., Ahmad, R., Noh, Z. (2013). Survivability modeling and analysis of mobile ad hoc network with correlated node behavior. Procedia Engineering. 53:435-440. DOI:10.1016/j.proeng.2013.02.057 DOI: https://doi.org/10.1016/j.proeng.2013.02.057
Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia-Social and Behavioral Sciences. 195:1872-1881. DOI:10.1016/j.sbspro.2015.06.424 DOI: https://doi.org/10.1016/j.sbspro.2015.06.424
Bansal, S., Kumar, D. (2020). Smart Devices Ecosystem:A survey on devices, gateways, operating systems. Middleware and Communication. International Journal of Wireless Information Networks. 27(4):1-25. DOI:10.1007/s10776-020-00483-7 DOI: https://doi.org/10.1007/s10776-020-00483-7
Blackburn, S. R., Robshaw, M. J. (2016). On the security of the Algebraic Eraser Tag Authentication Protocol. Applied Cryptography and Network Security Lecture Notes in Computer Science. 3-17. DOI: 10.1007/978-3-319-39555-5_1 DOI: https://doi.org/10.1007/978-3-319-39555-5_1
Bösch, C., Guajardo, J., Sadeghi, A., Shokrollahi, J., Tuyls, P. (2008). Efficient Helper Data Key Extractor on FPGAs. Cryptographic Hardware and Embedded Systems– CHES 2008 Lecture Notes in Computer Science. 181-197. DOI: 10.1007/978-3-540-85053-3_12 DOI: https://doi.org/10.1007/978-3-540-85053-3_12
Brinkmann, A., Fiehe, C., Litvina, A., Luck, I., Nagel, L., Narayanan, K., Ostermair, F., Thronicke, W. (2013). Scalable Monitoring System for Clouds. In Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, Dresden, Germany. 9-12. DOI: https://doi.org/10.1109/UCC.2013.103
Cai, H., Xu, B., Jiang, L., Vasilakos, A.V. (2016). Smart Devices-based Big Data Storage Systems in Cloud Computing: Perspectives and challenges. IEEE Internet Things Journal. 4:75-87. DOI: https://doi.org/10.1109/JIOT.2016.2619369
Cherdantseva, Y., Hilton, J. (2013). A reference model of information assurance and security. 2013 International Conference on Availability, Reliability and Security. DOI: 10.1109/ares.2013.72 DOI: https://doi.org/10.1109/ARES.2013.72
Claycomb, W. R., Nicoll, A. (2012). Insider threats to Cloud Computing: Directions for new research challenges. 2012 IEEE 36th Annual Computer Software and Applications Conference. DOI: 10.1109/ compsac.2012.113 DOI: https://doi.org/10.1109/COMPSAC.2012.113
Columbus, L. (2017, December 11). 2017 Roundup of Smart Devices Forecasts. Forbes. https://www.forbes.com/sites/louiscolumbus/2017/12/10/2017-roundup-of-internet-of-things-forecasts/?sh=3d933e2f 1480. Access on 15 May 2021.
Das, A. K., Zeadally, S., He, D. (2018). Taxonomy and analysis of security protocols for Smart Devices. Future Generation Computer System. 89:110-125. DOI:10.1016/j.future.2018.06.027 DOI: https://doi.org/10.1016/j.future.2018.06.027
Davoli, L., Veltri, L., Ferrari, G., Amadei, U. (2019). Smart Devices on Power Line Communications: An experimental performance analysis. In Kabalci, E., Kabalci, Y., (Eds.), Smart grids and their communication systems. 465-498. Singapore: Springer. DOI: https://doi.org/10.1007/978-981-13-1768-2_13
Deep, S., Zheng, X., Hamey, L. (2019). A survey of security and privacy issues in the Smart Devices from the layered context. arXiv 2019. arXiv: 1903.00846.
Delvaux, J., Gu, D., Verbauwhede, I., Hiller, M., Yu, M. D. (2016). Efficient fuzzy extraction of PUF-Induced Secrets: Theory and applications. Lecture Notes in Computer Science Cryptographic Hardware and Embedded Systems – CHES 2016. 412-431. DOI: 10.1007/978-3-662-53140-2_20. DOI: https://doi.org/10.1007/978-3-662-53140-2_20
Dhumane, A., Prasad, R., Prasad, J. (2016). Routing issues in Smart Devices: A survey. In Proceedings of the International Multiconference of Engineers and Computer Scientists, Hong Kong. 1:13-20.
Dybå, T., Dingsøyr, T. (2008). Empirical studies of Agile Software Development: A systematic review. Information and Software Technology. 50(9-10):833-859. DOI:10.1016/j.infsof.2008.01.006 DOI: https://doi.org/10.1016/j.infsof.2008.01.006
Grobauer, B., Walloschek, T., Stöcker, E. (2013). Understanding Cloud Computing Vulnerabilities. IEEE Security and Privacy. 9:50-57. DOI: 10.1109/MSP.2010.115. DOI: https://doi.org/10.1109/MSP.2010.115
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Smart Devices: A vision, architectural elements, and future directions. Future Generation Computer System. 29:1645-1660. DOI:10.1016/j.future.2013.01.010 DOI: https://doi.org/10.1016/j.future.2013.01.010
Hameed, S., Khan, F. I., Hameed, B. (2019). Understanding security requirements and challenges in Smart Devices: A review. Journal Computer Network Communication. 11:1-14. DOI:10.1155/2019/9629381 DOI: https://doi.org/10.1155/2019/9629381
Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P. (2017). A Lightweight Mutual Authentication Protocol for the Smart Devices. In International Conference on Mobile and Wireless Technology. 3-12. Singapore: Springer. DOI: https://doi.org/10.1007/978-981-10-5281-1_1
Harnik, D., Pinkas, B., Shulman-Peleg, A. (2017). Side channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security and Privacy. 8:40-47. DOI: 10.11 09/MSP.2010.187 DOI: https://doi.org/10.1109/MSP.2010.187
Hasan, M., Mohan, S. (2019). Protecting actuators in Safety-Critical Smart Devices Systems from control spoofing attacks. In Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things. 8-14. DOI:10.1145/3338507.3358615 DOI: https://doi.org/10.1145/3338507.3358615
Herder, C., Yu, M. D., Koushanfar, F., Devadas, S. (2014). Physical unclonable functions and applications: A tutorial. In Proceedings of the IEEE. 102(8):1126-1141. DOI:10.1109/JPROC.2014.2320516 DOI: https://doi.org/10.1109/JPROC.2014.2320516
He, D., Zeadallyn, S. (2015). An analysis of RFID Authentication Schemes for Smart Devices in healthcare environment using Elliptic Curve Cryptography. IEEE Smart Devices Journal. 2(1):72-83. DOI:10.1109/JIOT.2014.2360121 DOI: https://doi.org/10.1109/JIOT.2014.2360121
Kaaniche, N., Laurent, M. (2017). Data security and privacy preservation in Cloud Storage environments based on cryptographic mechanisms. Computer Communications. 111:120-141. DOI: 10.10 16/j.comcom.2017.07.006. DOI: https://doi.org/10.1016/j.comcom.2017.07.006
Khammash, M., Tammam, R., Masri, A., Awad, A. (2021). Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks. In 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD). 63-69. IEEE. DOI: https://doi.org/10.1109/SSD52085.2021.9429526
Kitchenham, B. (2004). Procedures for Performing Systematic Reviews. 33(2004):1-26. Keele, UK: Keele University.
Køien, G. M. (2011). Reflections on trust in devices: An informal survey of human trust in an Smart Devices context. Wireless Personal Communications. 61(3):495-510. DOI:10.1007/s11277-011-0386-4 DOI: https://doi.org/10.1007/s11277-011-0386-4
Kothmayr, Thomas. (2013). DTLS based security and two-way authentication for The Smart Devices. Ad Hoc Networks. 11(8):2710-2723. DOI:10.1016/j.adhoc.2013.05.003 DOI: https://doi.org/10.1016/j.adhoc.2013.05.003
Kumar, P. R., Raj, P. H., Jelciana, P. (2018). Exploring data security issues and solutions in Cloud Computing. Procedia Computer Science. 125:691-697. DOI: 10.1016/j. procs.2017.12.089 DOI: https://doi.org/10.1016/j.procs.2017.12.089
Lai, C., Li, H., Lu, R., Shen, X. S. (2013). A secure and efficient Group Authentication and Key Agreement Protocol for LTE Networks. Computer Network. 57:3492-3510. DOI:10.1016/j.comnet.2013.08.003 DOI: https://doi.org/10.1016/j.comnet.2013.08.003
Lara-Nino, C. A., Diaz-Perez, A., Morales-Sandoval, M. (2018). Elliptic curve lightweight cryptography: A survey. IEEE Access. 6:72514-72550. DOI: 10.1109/ACCESS.2018.2881444 DOI: https://doi.org/10.1109/ACCESS.2018.2881444
Lee, J. Y. (2017). A lightweight authentication protocol for Smart Devices. In International Symposium on Next-Generation Electronics, Kwei-Shan.
Li, F., Lai, A., Ddl, D. (2013). Evidence of Advanced Persistent Threat: A case study of malware for Political Espionage. Malicious and Unwanted Software (MALWARE). 2013 6th International Conference on IEEE. 102-109. DOI:10.1109/MALWARE.2011.6112333 DOI: https://doi.org/10.1109/MALWARE.2011.6112333
Li, N., Liu, D., Nepal, S. (2017). Lightweight Mutual Authentication for Smart Devices and its applications. IEEE Transactions on Sustainable Computing. 2(4):359-370. DOI: 10.1109/TSUSC.2017.2716953 DOI: https://doi.org/10.1109/TSUSC.2017.2716953
Li, Y., Gao, M., Yang, L., Zhang, C., Zhang, B., Zhao, X. (2020). Design of and research on Industrial Measuring Devices based on Smart Devices technology. Ad Hoc Networks. 102:102072. DOI: https://doi.org/10.1016/j.adhoc.2020.102072
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J. (2015). Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on Cloud. IEEE Transanctions on Computers. 64:2609-2622. DOI: 10.1109/ TC.2014.2375190 DOI: https://doi.org/10.1109/TC.2014.2375190
Liu, X., Zhao, M., Li, S., Zhang, F., Trappe. (2017). W. A security framework for the Smart Devices in the future Internet architecture. Future Internet. 9(3):1-27. DOI:10.3390/fi9030027 DOI: https://doi.org/10.3390/fi9030027
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I. (2016) Smart Devices: Vision, applications and research challenges. Ad Hoc Networks. 10(7):1497-1516. DOI:10.1016/j.adhoc.2012.02.016 DOI: https://doi.org/10.1016/j.adhoc.2012.02.016
Mohsen, N. A., Jha, N. K. (2016). A comprehensive study of security of Internet-of-Things. IEEE Transanctions on Emerging Topics in Computing. 5:586-602. DOI:10.1109/TETC.2016.2606384 DOI: https://doi.org/10.1109/TETC.2016.2606384
Nicanfar, H., Jokar, P., Beznosov, K., Leung, V. C. M. (2014). Efficient authentication and key management mechanisms for smart grid communications. IEEE System Journal. 8:629-640. DOI:10.1109/JSYST.2013.2260942 DOI: https://doi.org/10.1109/JSYST.2013.2260942
Pal, S., Hitchens, M., Varadharajan, V. (2018). Modeling identity for the Smart Devices: Survey, classification and trends. In Proceedings of the 2018 12th International Conference on Sensing Technology (ICST), Limerick, Ireland. 45-51. DOI:10.1109/ICSensT.2018.8603595 DOI: https://doi.org/10.1109/ICSensT.2018.8603595
Rashid, F., Miri, A., Woungang, I. (2012). A secure data deduplication framework for Cloud environments. In Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust, Paris, France. 81-87. DOI: 10.1109/ PST.2012.6297923 DOI: https://doi.org/10.1109/PST.2012.6297923
Roman, R., Zhou, J., Lopez, J. (2013). On the features and challenges of security and privacy in distributed Smart Devices. Computer Networks. 57(10):2266-2279. DOI:10.1016/j.comnet.2012.12.018 DOI: https://doi.org/10.1016/j.comnet.2012.12.018
Salleh, N., Mendes, E., Grundy, J. (2013). The effects of openness to experience on pair programming in a Higher Education context. In 2013 24th IEEE-CS Conference on Software Engineering Education and Training (CSEE&T). 149-158. DOI:10.1109/CSEET.2011.5876082 DOI: https://doi.org/10.1109/CSEET.2011.5876082
Schmitt, C., Noack, M., Stiller, B., Tiny, T. O. (2016). Two-way authentication for constrained devices in the Smart Devices. In Smart Devices. Amsterdam, The Netherlands: Elsevier. 239-258. DOI: https://doi.org/10.1016/B978-0-12-805395-9.00013-7
Shahbodin, F., Azni, A. H., Ali, T., Mohd, C. K. N. C. K. (2019, January). Lightweight cryptography techniques for MHealth cybersecurity. In Proceedings of the 2019 Asia Pacific Information Technology Conference. 44-50. DOI:10.1145/3314527.3314536 DOI: https://doi.org/10.1145/3314527.3314536
Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., Yim. K. (2018). A framework for Mitigating Zero-Day Attacks in Smart Devices. arXiv 2018. arXiv: 1804.05549
Shen, J., Yang, H., Wang, A., Zhou, T., Wang, C. (2019). Lightweight Authentication and Matrix-Based Key Agreement Scheme for Healthcare in Fog Computing. Peer-to-Peer Network Application. 12(4):924-933. DOI:10.1007/s12083-018-0696-3 DOI: https://doi.org/10.1007/s12083-018-0696-3
Sicari, S., Rizzardi, A., Grieco, L. A. (2015). A security, privacy and trust in Smart Devices: The road ahead. Computer Network. 76:146-164. DOI:10.1016/j.comnet.2014.11.008 DOI: https://doi.org/10.1016/j.comnet.2014.11.008
Singh, A., Chatterjee, K. (2015). A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment. In Proceedings of the 2015 International Conference on Circuits. Power and Computing Technologies [ICCPCT-2015], Nagercoil, India. DOI:10.1109/ICCPCT.2015.7159276 DOI: https://doi.org/10.1109/ICCPCT.2015.7159276
Singh, S., Sharma, P. K., Moon, S. Y., Park, J. H. (2017). Advanced lightweight encryption algorithms for Smart Devices devices: Survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. 15(2):1-18. DOI:10.1007/s12652-017-0494-4 DOI: https://doi.org/10.1007/s12652-017-0494-4
Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., Choo, K. K. R. (2020). A systematic literature review of Blockchain Cyber Security. Digital Communications and Networks. 6(2):147-156. DOI:10.1016/j.dcan.2019.01.005 DOI: https://doi.org/10.1016/j.dcan.2019.01.005
Turkanovi, M. (2014). A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, based on the Smart Devices Notion. Ad Hoc Networks. 20:96-112. DOI:10.1016/j.adhoc.2014.03.009 DOI: https://doi.org/10.1016/j.adhoc.2014.03.009
Wendt, J. B., Potkonjak, M. (2014). Hardware Obfuscation Using PUF-Based Logic. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 270-271. DOI: https://doi.org/10.1109/ICCAD.2014.7001362
Williams, Patricia, A. H., Vincent. M. (2016). Always connected: The security challenges of the healthcare Smart Devices. IEEE 3rd World Forum on Smart Devices (WF-Smart Devices). DOI: 10.1109/wf-Smart Devices.2016.7845455 2 DOI: https://doi.org/10.1109/WF-IoT.2016.7845455
Wu, Z. Q. (2017). A Security Transmission Model for Smart Devices. Chinese Journal of Computers. 34(8):1351-1364. DOI:10.3724/SP.J.1016.2011.01351 DOI: https://doi.org/10.3724/SP.J.1016.2011.01351
Yanling, Z. (2013). Research on Data Security Technology in Smart Devices. Applied Mechanics and Materials. 433-435, 1752-155. DOI: https://doi.org/10.4028/www.scientific.net/AMM.433-435.1752
Yaqoob, I., Hashem, I. A. T., Ahmed, A., Kazmi, S. A. (2019). Smart Devices Forensics: Recent advances, taxonomy, requirements, and open challenges. Future Generations Computer System. 92:265-275. DOI:10.1016/j.future.2018.09.058 DOI: https://doi.org/10.1016/j.future.2018.09.058
Ye, N., Zhu, Y., Wang, R. C., Malekian, R., Qiao-min, L. (2014). An efficient authentication and access control scheme for perception layer of Smart Devices. Applied Mathematics & Information Sciences. 8(4):1617-1624. DOI:10.12785/amis/080416 DOI: https://doi.org/10.12785/amis/080416
Yu, S., Guo, S. (2016). Big data concepts, theories, and applications. Cham, Switzerland: Springer International Publishing. 1-437. DOI: 10.1007/978-3-319-27763-9 DOI: https://doi.org/10.1007/978-3-319-27763-9
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.