Open Access
REVIEW
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
1 Department of Computer Science and Engineering, National Institute of Technology Jamshedpur, Jamshedpur, India
2 School of Computing Science and Engineering, VIT University Bhopal, Bhopal, 466114, India
3 Center for Industrial Software, The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Sonderborg, Odense, Denmark
4 Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, 2800, Denmark
5 Department of Information Security, Cryptology, and Mathematics, Kookmin University, Seoul, South Korea
* Corresponding Author: Ilsun You. Email:
Computers, Materials & Continua 2024, 78(1), 31-63. https://doi.org/10.32604/cmc.2023.047084
Received 24 October 2023; Accepted 11 December 2023; Issue published 30 January 2024
Abstract
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained resources such as electricity, memory, processing power, and square footage. This research intends to analyse resource-constrained IoT devices, including RFID tags, sensors, and smart cards, and the issues involved with protecting them in such restricted circumstances. Using lightweight cryptography, the information sent between these gadgets may be secured. In order to provide a holistic picture, this research evaluates and contrasts well-known algorithms based on their implementation cost, hardware/software efficiency, and attack resistance features. We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.