z-logo
open-access-imgOpen Access
A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions
Author(s) -
Jihane Jebrane,
Saiida Lazaar
Publication year - 2021
Publication title -
general letters in mathematics
Language(s) - English
Resource type - Journals
eISSN - 2519-9277
pISSN - 2519-9269
DOI - 10.31559/glm2021.10.2.5
Subject(s) - computer science , cryptography , cryptographic primitive , security of cryptographic hash functions , hash function , secure hash algorithm , authentication (law) , cryptographic protocol , context (archaeology) , cryptographic hash function , computer security , internet of things , hash based message authentication code , message authentication code , sha 2 , paleontology , biology
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here