Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review
Cryptography is described as the study of encrypting or secret Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medic...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Utara Malaysia Press
2020
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/28793/1/JICT%2019%2003%202020%20279-319.pdf |
_version_ | 1803629522742935552 |
---|---|
author | Mohamed, Nur Nabila Mohd Yussoff, Yusnani Saleh, Mohammed Ahmed Hashim, Habibah |
author_facet | Mohamed, Nur Nabila Mohd Yussoff, Yusnani Saleh, Mohammed Ahmed Hashim, Habibah |
author_sort | Mohamed, Nur Nabila |
collection | UUM |
description | Cryptography is described as the study of encrypting or secret Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a cost effective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes. |
first_indexed | 2024-07-04T06:39:12Z |
format | Article |
id | uum-28793 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T06:39:12Z |
publishDate | 2020 |
publisher | Universiti Utara Malaysia Press |
record_format | dspace |
spelling | uum-287932022-08-07T03:14:30Z https://repo.uum.edu.my/id/eprint/28793/ Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review Mohamed, Nur Nabila Mohd Yussoff, Yusnani Saleh, Mohammed Ahmed Hashim, Habibah TK Electrical engineering. Electronics Nuclear engineering Cryptography is described as the study of encrypting or secret Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the system has some disadvantages. For instance, symmetric encryption method provides a cost effective technique of securing data without compromising security. However, sharing the secret key is a vital problem. On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographic of every single scheme, integration of several cryptographic schemes which are also called the hybridization technique is being proposed offering the efficiency of securing data and solving the issue of key distribution. Herein, a review study of articles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implemented hybrid approaches were identified and the review was conducted according to the category of the domain. The significant findings from this literature review included the exploration of various IoT domains that implemented hybrid cryptographic techniques for improving performance in related works. From the findings, it can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services. In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes. Universiti Utara Malaysia Press 2020 Article PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/28793/1/JICT%2019%2003%202020%20279-319.pdf Mohamed, Nur Nabila and Mohd Yussoff, Yusnani and Saleh, Mohammed Ahmed and Hashim, Habibah (2020) Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review. Journal of Information and Communication Technology, 19 (03). pp. 279-319. ISSN 2180-3862 |
spellingShingle | TK Electrical engineering. Electronics Nuclear engineering Mohamed, Nur Nabila Mohd Yussoff, Yusnani Saleh, Mohammed Ahmed Hashim, Habibah Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title | Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title_full | Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title_fullStr | Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title_full_unstemmed | Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title_short | Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review |
title_sort | hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet of things applications a review |
topic | TK Electrical engineering. Electronics Nuclear engineering |
url | https://repo.uum.edu.my/id/eprint/28793/1/JICT%2019%2003%202020%20279-319.pdf |
work_keys_str_mv | AT mohamednurnabila hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT mohdyussoffyusnani hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT salehmohammedahmed hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT hashimhabibah hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview |