HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicals...

Full description

Bibliographic Details
Main Authors: Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohammed Ahmed Saleh, Habibah Hashim
Format: Article
Language:English
Published: UUM Press 2020-06-01
Series:Journal of ICT
Subjects:
Online Access:https://e-journal.uum.edu.my/index.php/jict/article/view/12385
_version_ 1798040926884462592
author Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
author_facet Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
author_sort Nur Nabila Mohamed
collection DOAJ
description Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes.
first_indexed 2024-04-11T22:14:25Z
format Article
id doaj.art-2d5b1d8925ab4e4db6bf2ec848a75926
institution Directory Open Access Journal
issn 1675-414X
2180-3862
language English
last_indexed 2024-04-11T22:14:25Z
publishDate 2020-06-01
publisher UUM Press
record_format Article
series Journal of ICT
spelling doaj.art-2d5b1d8925ab4e4db6bf2ec848a759262022-12-22T04:00:28ZengUUM PressJournal of ICT1675-414X2180-38622020-06-01193HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEWNur Nabila Mohamed0Yusnani Mohd Yussoff1Mohammed Ahmed Saleh2Habibah Hashim3Faculty of Engineering & Built Environment, Mahsa University, MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,Malaysia Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes. https://e-journal.uum.edu.my/index.php/jict/article/view/12385CryptographyInternet of thingsencryptionpublic key cryptographysecurity
spellingShingle Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
Journal of ICT
Cryptography
Internet of things
encryption
public key cryptography
security
title HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
title_full HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
title_fullStr HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
title_full_unstemmed HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
title_short HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
title_sort hybrid cryptographic approach for internet of things applications a review
topic Cryptography
Internet of things
encryption
public key cryptography
security
url https://e-journal.uum.edu.my/index.php/jict/article/view/12385
work_keys_str_mv AT nurnabilamohamed hybridcryptographicapproachforinternetofthingsapplicationsareview
AT yusnanimohdyussoff hybridcryptographicapproachforinternetofthingsapplicationsareview
AT mohammedahmedsaleh hybridcryptographicapproachforinternetofthingsapplicationsareview
AT habibahhashim hybridcryptographicapproachforinternetofthingsapplicationsareview