HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicals...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UUM Press
2020-06-01
|
Series: | Journal of ICT |
Subjects: | |
Online Access: | https://e-journal.uum.edu.my/index.php/jict/article/view/12385 |
_version_ | 1798040926884462592 |
---|---|
author | Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim |
author_facet | Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim |
author_sort | Nur Nabila Mohamed |
collection | DOAJ |
description |
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes.
|
first_indexed | 2024-04-11T22:14:25Z |
format | Article |
id | doaj.art-2d5b1d8925ab4e4db6bf2ec848a75926 |
institution | Directory Open Access Journal |
issn | 1675-414X 2180-3862 |
language | English |
last_indexed | 2024-04-11T22:14:25Z |
publishDate | 2020-06-01 |
publisher | UUM Press |
record_format | Article |
series | Journal of ICT |
spelling | doaj.art-2d5b1d8925ab4e4db6bf2ec848a759262022-12-22T04:00:28ZengUUM PressJournal of ICT1675-414X2180-38622020-06-01193HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEWNur Nabila Mohamed0Yusnani Mohd Yussoff1Mohammed Ahmed Saleh2Habibah Hashim3Faculty of Engineering & Built Environment, Mahsa University, MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,MalaysiaFaculty of Electrical Engineering, Universiti Teknologi MARA,Malaysia Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes. https://e-journal.uum.edu.my/index.php/jict/article/view/12385CryptographyInternet of thingsencryptionpublic key cryptographysecurity |
spellingShingle | Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW Journal of ICT Cryptography Internet of things encryption public key cryptography security |
title | HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW |
title_full | HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW |
title_fullStr | HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW |
title_full_unstemmed | HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW |
title_short | HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW |
title_sort | hybrid cryptographic approach for internet of things applications a review |
topic | Cryptography Internet of things encryption public key cryptography security |
url | https://e-journal.uum.edu.my/index.php/jict/article/view/12385 |
work_keys_str_mv | AT nurnabilamohamed hybridcryptographicapproachforinternetofthingsapplicationsareview AT yusnanimohdyussoff hybridcryptographicapproachforinternetofthingsapplicationsareview AT mohammedahmedsaleh hybridcryptographicapproachforinternetofthingsapplicationsareview AT habibahhashim hybridcryptographicapproachforinternetofthingsapplicationsareview |