Smart City Gnosys

Smart city article details

Title Cryptographic Hash Functions And Attack Complexity Analysis
ID_Doc 16774
Authors Bairwa A.; Soni V.; Hemrajani P.; Kushwaha S.S.; Bohra M.K.
Year 2022
Published Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges
DOI http://dx.doi.org/10.1201/9781003240310-11
Abstract A massive amount of sensitive data is currently being transferred with the meteoric rise in Internet of Things (IoT) applications. Images supplied by these applications are improving standards of living, providing high-end facilities to monitor critical issues in healthcare, agriculture, production industries, weather monitoring, smart cities, defence, underwater surveillance, and smart grid, among others. Typical IoT applications involve three layers: (1) a physical or perception layer which contains sensory devices; (2) a network layer containing networking devices such as gateways and routers to communicate data sensed by the sensors to the cloud servers; and (3) an application layer which has the necessary interface to interact with the end users. Sensory devices generally have constraints regarding computing capability, communication power, bandwidths, latency, and battery capacity. Therefore, providing secure communications between these devices is an exceedingly important criterion for various sensing applications. Any inadvertent security attack could be life-threatening for an individual, or could cause havoc for the entire nation. Conventional ciphers cannot be implemented due to their inherent complexities and high power consumption. Lightweight ciphers represent a possible security solution for the perception layer. However, the selection of tools to build a lightweight cipher is highly dependent on the type of sensory device being used for an application. This chapter describes the design of a lightweight cipher for the perception layer of IoT applications, using cellular automata (CA) for both text and image data. Since conventional CA-based ciphers lack the required resistance against many security attacks, the chapter first examines some basic requirements that satisfy the essential cryptographic criteria for building symmetric key block ciphers. © 2023 selection and editorial matter, [Sarvesh Tanwar, Sumit Badotra and Ajay Rana]; individual chapters, the contributors.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
23929 View0.875Desai L.R.; Malathi P.; Patil D.M.; Sonone S.T.; Kalokhe S.G.; Jawalkar A.Enhancing Security In Iot Devices With A Comprehensive Analysis Of Lightweight Cryptographic AlgorithmsAdvances in Nonlinear Variational Inequalities, 27, 4 (2024)
35256 View0.87Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
35266 View0.861Sun Y.; Lo F.P.-W.; Lo B.Lightweight Internet Of Things Device Authentication, Encryption, And Key Distribution Using End-To-End Neural CryptosystemsIEEE Internet of Things Journal, 9, 16 (2022)
35277 View0.856Joshi M.; Mazumdar B.; Dey S.Lightweight Security Protocols For Securing Iot Devices In Smart CitiesAdvanced Sciences and Technologies for Security Applications (2021)
40558 View0.854Ghorashi S.R.; Zia T.; Jiang Y.Optimisation Of Lightweight Klein Encryption Algorithm With 3 S-Box2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020 (2020)
2150 View0.85Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)