Encryption Of Internet Of Things Constrained Device For Digital Envelope: A Systematic Literature Review

Isa Mulia Insan, Febriliyan Samopa

Abstract


Not only the exchange of information between IoT devices but integration between IoT devices and cloud servers has also brought IoT to a higher level. Security is the main problem for IoT devices with limited resources for exchanging information. Digital envelopes are one method that uses encryption to secure data. However, limited resources on constrained devices necessitate selecting the proper encryption. This systematic literature review (SLR) was conducted on 11 of 43 studies that have used encryption algorithms for IoT devices. In addition to using the algorithm, it will also explain the device used and the safety factor. A suitable encryption algorithm for the digital envelope has been found. In addition, Some of the safety factors, IoT devices, and specifications are also shown.

Keywords


Internet of Things; Encryption; Digital Envelope; Constrained Device

Full Text:

PDF

References


Mike, O Ojo S, Giordano G, Procissi INS. A Review of Low-End, Middle-End, and High-End Iot Devices. IEEE Access2018;6:70528–70554. https://ieeexplore.ieee.org/document/8528362.8 Febriliyan Samopa ET AL.

Hari, Kishan Kondaveeti a N, Kumar Kumaravelu b S, Dayal Vanambathina b S, Ellison Mathe b S, Vappangi. A systematicliterature review on prototyping with Arduino: Applications, challenges, advantages, and limitations. Computer ScienceReview 2021;40. https://www.sciencedirect.com/science/article/pii/S1574013721000046?via%3Dihub.

Weibao, Gao a b X, Luo b Y, Liu b Y, Zhao a Y, Cui. Development of an arduino-based integrated system for sensingof hydrogen peroxide. Sensors & Actuators Reports 2021;3:100045. https://www.sciencedirect.com/science/article/pii/S2666053921000217?via%3Dihub.

Oscar, O Rodriguez-Diaz D, F Novella-Rodriguez E, Witrant E, Franco-Mejía. Benchmark for analysis, modeling andcontrol of ventilation systems in small-scale mine. 2019 International Conference on Control & Automation & Diagnosis(ICCAD) 2020;3:1–6. https://ieeexplore.ieee.org/document/9037923.

Giuseppe Nebbione MCC. Security of IoT Application Layer Protocols: Challenges and Findings. Future Internet2020;12:3:55. https://www.mdpi.com/1999-5903/12/3/55.

Panda, Prabhat Kumar C, Sudipta. A secure mutual authentication protocol for IoT environment. Journal of ReliableIntelligent Environments 2020;6:79–94. https://link.springer.com/article/10.1007/s40860-020-00098-y.

Chau D M Pham T, Dang K. A lightweight authentication protocol for D2D-enabled IoT systems with privacy. Pervasiveand Mobile Computing 2021;74. https://www.sciencedirect.com/science/article/pii/S1574119221000559?via%3Dihub.

An, Braeken M, Liyanage A, Jurcut D. Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA). WirelessPersonal Communications 2019;106:345–364. https://link.springer.com/article/10.1007/s11277-019-06165-9.

Kai, Fan a H, Xu a L, Gao b H, Li a Y, Yang. Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Generation Computer Systems 2019;99:134–142. https://www.sciencedirect.com/science/article/pii/S0167739X18323367?via%3Dihub.

Marco, Rasori M, La Manna P, Perazzo G, Dini. A Survey on Attribute-Based Encryption Schemes Suitable for the Internetof Things. IEEE Internet of Things Journal 2022;9:8269 – 829. https://ieeexplore.ieee.org/document/9721417.

Farid, Akbar Siregar A, Rizka A, Siregar F. Analisis Perbandingan Algoritma NGG dan GGHN pada Frekuensi HasilEnkripsi. Building of Informatics, Technology and Science (BITS) 2022;4:1860–1865. https://ejurnal.seminar-id.com/index.php/bits/article/view/1639.

Mariem, Bouchaala C, Ghazel L, Saidane A. Revocable sliced ciphertext policy attribute based encryption scheme in cloudcomputing. International Conference on Engineering Research, Innovation and Education 2014;1-6. https://ieeexplore.ieee.org/document/8766597.

Christian, F Durach J, Kembro A, Wieland. A New Paradigm for Systematic Literature Reviews in Supply Chain Man-agement. Journal of Supply Chain Management 2017;53:4:67–85. https://onlinelibrary.wiley.com/doi/10.1111/jscm.12145.

Saurabh, Singh P, Kumar Sharma S, Moon Y, Park JH. Advanced lightweight encryption algorithms for IoT devices: survey,challenges and solutions. Ambient Intell Humaniz Comput 2017;https://onlinelibrary.wiley.com/doi/10.1002/cpe.6450.

Mohamed, Sirajudeen Yoosuf A, R. MQTT-PRESENT: Approach to secure internet of things applications using MQTTprotocol. International Journal of Electrical and Computer Engineering (IJECE) 2021;11:5:4577. https://ijece.iaescore.com/index.php/IJECE/article/view/25403.

Nawal, Alsaffar W, Elmedany H, Ali. Application of RC5 for IoT devices in smart transportation system. 2019 8thInternational Conference on Modeling Simulation and Applied Optimization (ICMSAO), IEEE 2019;11:1–4. https://ieeexplore.ieee.org/document/8880351.

Al, Mashhadani M S, M. IoT Security Using AES Encryption Technology based ESP32 Platform. International ArabJournal of Information Technology 2022;19 No. 2.Febriliyan Samopa ET AL. 9

V, Bansod T, Khandekar K. Reliability and availability of IoT devices in resource constrained environments. Interna-tional Journal of Quality and Reliability Management 2022;39:1648–1662. https://www.emerald.com/insight/content/doi/10.1108/IJQRM-09-2021-0334/full/html.

Majid, Mumtaz J, Akram L, Ping. An RSA based authentication system for smart IoT environment. Proceedings - 21stIEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conferenceon Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019 (2019)2019;11. https://ieeexplore.ieee.org/document/8855549.

Bismark, Tei Asare K, Quist Aphetsi L, Nana. Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE.in 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), IEEE 2019;p. 101–104. https://ieeexplore.ieee.org/document/9058353.

Tanmoy, Maitra M, S Obaidat D, Giri S, Dutta K, Dahal. ElGamal cryptosystem-based secure authentication system forcloud-based IoT applications. IET Networks 2019;8, No. 5:289–298. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-net.2019.0004.

Mohamed, Sirajudeen Yoosuf A, R. Lightweight fog-centric auditing scheme to verify integrity of IoT healthcare data inthe cloud environment. Concurr Comput 2021;33, No. 24:289–298. https://onlinelibrary.wiley.com/doi/10.1002/cpe.6450.

M C, Pham T, Nguyen LP, Dang TK. Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Schemefor Device-to-Server and Device-to-Device Communications. Lecture Notes in Computer Science (including subseriesLecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019;11814:446–466. https://link.springer.com/chapter/10.1007/978-3-030-35653-8_30.

Ankur, Lohachab K. ECC based inter-device authentication and authorization scheme using MQTT for IoT net-works. Journal of Information Security and Applications 2019;46:1–12. https://www.sciencedirect.com/science/article/pii/S2214212618306513?via%3Dihub.

Anothay, Phimphinith X, Anping Q, Zhu Y, Jiang Y, Shen. An Enhanced Mutual Authentication Scheme Based on ECDHfor IoT Devices Using ESP8266. 2019 IEEE 11th International Conference on Communication Software and Networks(ICCSN), IEEE 2019;46:490–496. https://ieeexplore.ieee.org/document/8905268.

Bormann, Keranen E. Terminology for Constrained-Node Networks. Internet Engineering Task Force (IETF) 2019;46:490–496.




DOI: http://dx.doi.org/10.12962%2Fj20882033.v34i3.16830

Refbacks

  • There are currently no refbacks.


Creative Commons License

IPTEK Journal of Science and Technology by Lembaga Penelitian dan Pengabdian kepada Masyarakat, ITS is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at https://iptek.its.ac.id/index.php/jts.