Review on Internet of Things Attacks and Their Countermeasure using Lightweight Cipher Algorithms

Main Article Content

anandika sharma

Abstract

- Due to the increasing demand of interconnected devices has led to the world “internet of things†which transform the real world into the virtual objects. After 1991 there is a great change in human life, industry and organization due to the development of interconnected devices which leads to speed up processes, reduce errors, and prevent theft to make automation in all areas. IoT covers wide range of applications like smart transport, smart health, smart city, smart farming and many more due to the increasing components in the IoT some components are unattended so it is easy to attack them. The combination of network, things and services IoT needs to be secured and privacy issues are the main concern. In this paper, a survey on evolution of IoT network, their attacks, and on the basis of application survey is done. From the survey, found that cryptographic techniques have been applied to secure the data on IoT. The IoT devices are resource constraint devices so conventional algorithms performance not efficient so lightweight algorithms required. Also, in this paper comparative analysis is done on lightweight algorithms

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

anandika sharma

student,department of computer science, Punjabi university, Patiala, Punjab

References

Research on the architecture of IoT in advanced computing theory and engineering. 2010.

Jozef Glovaa,, Tomáš Sabola , Viliam Vajdaa, “Business Models for the Internet of Things Environment,†ScienceDirect , 15 ( 2014 ) 1122 – 1129 .

S.C.B. Intelligence, Disruptive civil technologies, in: Six Technologies with Potential Impacts on US Interests Out to 2025, 2008.

https://www.postscapes.com/internet-of-things-history/

Carnegie Mellon University – CMU SCS Coke Machine

Transmitter.ieee.org

Jozef Glovaa, Tomáš Sabola, Viliam Vajdaa,†Business Models for the Internet of Things Environment,†Elsevier science direct volume 15, 2014, Pages 1122-1129.

Grant Ho Derek Leung, Pratyush Mishra, Ashkan,Hosseini, Dawn Song, David Wagner,†Smart Locks: Lessons for Securing commodity internet of things devices,†ACM, ’16 May 30-June 03, 2016.

Rolf H. Weber,†Internet of Things – New security and privacy challenges,†ELSEVIER science direct.

GAN Gang,LU Zeyong,JIANG Jun,â€Internet of Things Security Analysis,†IEEE 30 August 2011.

Somayya Madakam, R. Ramaswamy, Siddharth Tripathi,†Internet of Things (IoT): A Literature review,†scientific research Vol.3 No.5, May 2015.

Shubham Bhatia1, Abhishek Chauhan2, Vaibhav K. Nigam3, “The Internet of Things: A Survey on Technology and Trends†International Research Journal of Engineering and Technology,†(IRJET).

Rolf H. Weber, Evelyne Studer ,†Cybersecurity in the Internet of Things: Legal aspects,†ESLSEVIER

1016/j.clsr.2016.07.002.

www.nist.gov

Nilesh Mali1, Prof A. B. Kanwade,’ “A Review on Smart City through Internet of Things (IOT),â€Volume 2, Issue 6, June 2016

K. Niranjana Devi, R. Muthuselvi,†Secret Sharing of IoT Healthcare Data Using cryptographic algorithm,†International Journal of Engineering Research Volume No.5 20 May 2016.

Arlene E. Chung, MD, MHA, MMCi, Roxanne E. Jensen, PhD, and Ethan M. Basch, MD, MSc. “Leveraging Emerging Technologiesand the “Internet of Things†to Improve the Quality of Cancer Care,†jop.ascopubs.org ,Volume 12 / Issue 10 / October 2016.

B. Karakostas, “A dns architecture for the internet of things: A case study in transport logistics,†Procedia Computer Science, vol. 19, pp.594–601, 2013.

NISTIR 8114 Report on Lightweight Cryptography Kerry A. McKay Larry Bassham Meltem SönmezTuran Nicky Mouha Computer Security Division Information technology laboratory, march 2017.

International Standard ISO/IEC Information Technology - Security Techniques. Lightweight Cryptography. 2012.

Bogdanov A, Knudsen L.R, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C. Present: “An Ultra- Lightweight Block Cipher. Berlin Heidelb,â€: Springer; 2007. p.0 450–66.

Ray Beaulieu, Douglas Shors ,Jason Smith, Stefan Treatman-Clark ,Bryan Weeks, Louis Wingers,â€THE SIMON AND SPECK FAMILIES OF LIGHTWEIGHT BLOCK CIPHERS,†National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, 19 June 2013.

Gaurav Bansod*, Narayan Pisharoty, and Abhijit Patil, “ PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing,†Defence Science Journal, Vol. 66, No. 3, May 2016, pp. 259-265.

Shivlal Mewada, Pradeep Sharma, S. S. Gautam,†Exploration of efficient symmetric AES algorithm,â€,IEEE, 19 September 2016, 10.1109/CDAN.2016.7570921

C.P. Sotiriou, Y. Papaefstathiou.†Design-space exploration of a cryptography algorithm,†IEEE, 01 June 2004, 10.1109/ICECS.2003.1301922.

Dudhatra Nilesh, Malti Nagle,†The new cryptography algorithm with high throughput,tâ€,IEEE, 16 October 2014, 10.1109/ICCCI.2014.6921739.

Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil,†PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing, †Defence Science Journal, Vol. 66, No. 3, May 2016,