CFP last date
20 January 2025
Reseach Article

A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices

by Jahidul Arafat, Md. Abdul Malek Chowdury, Tazkia Binty Faruque
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 49
Year of Publication: 2019
Authors: Jahidul Arafat, Md. Abdul Malek Chowdury, Tazkia Binty Faruque
10.5120/ijca2019918758

Jahidul Arafat, Md. Abdul Malek Chowdury, Tazkia Binty Faruque . A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices. International Journal of Computer Applications. 182, 49 ( Apr 2019), 29-35. DOI=10.5120/ijca2019918758

@article{ 10.5120/ijca2019918758,
author = { Jahidul Arafat, Md. Abdul Malek Chowdury, Tazkia Binty Faruque },
title = { A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 49 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number49/30530-2019918758/ },
doi = { 10.5120/ijca2019918758 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:48.412120+05:30
%A Jahidul Arafat
%A Md. Abdul Malek Chowdury
%A Tazkia Binty Faruque
%T A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 49
%P 29-35
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the digital world, which is currently evolving and changing at such a rapid pace, the security of information has become increasingly more important. To preserve the secrecy of the information, cryptography has specific roles to protect files from unauthorized access. In this paper, a new robust and lightweight cryptography algorithm named as LWC to increase security at a cheaper cost in the Symmetric-key producing algorithm. This algorithm ensures data stability, integration and privacy for those data files which are in size around 1 K.B to 512 K.B. Considering the lower time and power consumptions and the hardware capabilities of IoT devices, this solution provides a cheap and effective alternative for them.

References
  1. W. Wanping, J. Jin, and J. Cheng, “The research and design of ATM PIN pad based on triple DES,” in IEEE International Conference on Information and Automation (ICIA), (Shenzhen), pp. 443 – 447, IEEE, 2011.
  2. S. Kurita and K. Komoriya, “Privacy protection on transfer system of Automated Teller Machine from brute force attack,” in International Conference on Advanced Information Networking and Applications Workshops (WAINA), (Fukuoka), pp. 72 – 77, IEEE, 2012.
  3. O. Dandash, P. D. Le, and B. Srinivasan, “Security analysis for internet banking models,” in Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, (Qingdao), pp. 1141 – 1146, IEEE, 2007.
  4. A. Hiltgen, T. Kramp, and T. Weigold, “Secure internet banking authentication,” Security & Privacy, IEEE, pp. 21 – 29, 2006.
  5. V. Cunsolo and S. Distefano, “Achieving information security in network computing systems,” in Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, (Chengdu), pp. 71 – 77, IEEE, 2009.
  6. C. Manifavas, G. Hatzivasilis, K. Fysarakis, and K. Rantos, “Lightweight cryptography for embedded systems a comparative analysis,” (Egham), 6th International Workshop on Autonomous and Spontaneous Security, 2013.
  7. D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, “Hummingbird: ultra-lightweight cryptography for resource-constrained devices,” in FC’10 Proceedings of the 14th international conference on Financial cryptograpy and data security, (Heidelberg), pp. 3–18, Springer-Verlag Berlin, 2010.
  8. O. Goldreich, Foundations of Cryptography. Cambridge: Cambridge university press, 2004.
  9. H. Delfs and H. Knebl, Introduction to cryptography: principles and applications. Nurnberg: Springer Publications, 2007.
  10. L. A. Baglione, “Writing a research paper in political science: A practical guide to inquiry, structure, and methods,” Thousand Oaks: CQ Press, 2nd edition ed., 2012.
  11. R. M. Nieswiadomy, Foundations of Nursing Research. Michigan: Appleton & Lange, 1998.
  12. J. H. Geri LoBiondo-Wood, Nursing Research: Methods and Critical Appraisal for Evidence-Based Practice, (Nursing Research: Methods, Critical Appraisal & Utilization). Sydney: Libby Houston and Melinda McEvoy, 8 th ed., 2013.
  13. C. Shannon, “Communication theory of secrecy systems,” 1949.
  14. B. Schneier, “Applied cryptography: Protocols, algorithms, and source code in c,” New Jersey: John Wiley & Sons, 1996.
  15. S. Knapskog, “New cryptographic primitives,” in Computer Information Systems and Industrial Management Applications (CISIM) Conference, (Ostrava), pp. 3 – 7, IEEE, 2008.
  16. A. Kumar, K. Gopal, and A. Aggarwal, “A complete, efficient and lightweight cryptography solution for resource contrainst mobile ad-hoc networks,” in 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), (Solan), pp. 854 – 860, IEEE, 2012.
  17. A. Barbero, G. Horler, A. Kholosha, and O. Ytrehus, “Lightweight cryptography for rfid devices,” in IET International Conference on Wireless, Mobile and Multimedia Networks, (Beijing), pp. 294 – 297, IET, 2008.
  18. M. Stottinger, S. Huss, S. Muhlbach, and A. Koch, “Side-channel resistance evaluation of a neural network based lightweight cryptography scheme,” in IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), (Hong Kong), pp. 603 – 608, IEEE, 2010.
  19. S. Tripathy and S. Nandi, “Lcase: Lightweight cellular automata-based symmetric-key encryption,” International Journal of Network Security, p. 243, 2009.
  20. D. Bradbury, “feature: Encryption-the-key-to-secure-data: computerweekly.,” April 2005. Retrieved December 20, 2014, from computerweekly: http://www.computerweekly.com/feature/Encryption-the-key-to-secure-data.
  21. M. Katagi and S. Moriai, “Lightweight cryptography for the internet of things,” Tokyo: Sony Corporation, 2010.
  22. https://www.iconlabs.com/prod/internet-secure-things-%E2%80%93-what-really-needed-secure-internet-things
Index Terms

Computer Science
Information Sciences

Keywords

LWE Algorithm IoT Security Cryptography.