2. Review of Closely Related Works
A number of review articles have been published on IoT lightweight cryptography. Several of these articles provide an overview of IoT technology, IoT security, challenges associated with using conventional cryptography for IoT devices with limited resources, and an analysis of suitable LWC currently available. An overview of some of the most significant review articles relating directly to this topic can be found in this section.
The architecture and threats associated with IoT, devices at different layers, and securing IoT systems, as well as limitations of existing lightweight cryptography, have been discussed by Rana et al. [
29]. They have addressed several questions, including what lightweight cryptography has developed to address security issues in IoT, how lightweight cryptography secures IoT devices, and the implications of the findings for future research in IoT. A series of IoT layers, as well as their vulnerability, were discussed in broad terms in the article. As the title suggests, it summarizes the capabilities of computer boards used in IoT devices as a whole. In addition, an excellent discussion was provided on the cipher methods and algorithms used in lightweight cryptography. The limitations of existing lightweight cryptography for IoT were discussed well. This article is comprehensive and provides relevant information for developing efficient encryption for further research.
Shahzad et al. [
30] outlined some key topics related to attribute-based encryption, cipher text, and key management policy in IoT application security. Additionally, they discussed identity-based encryption, searchable encryption, and predicate encryption. A discussion of functional-based encryption is presented in the final section of the article. In addition, they provided excellent illustrations of some applications of encryptions in the form of graphical and tabular representations. Therefore, it provides a comprehensive discussion of all types of encryptions, as well as their limitations and applications. This article provides valuable insight into the process of developing a new cipher algorithm by a researcher.
Mrabet et al. [
31] explored IoT technologies, IoT architecture, IoT physical devices and sensors, IoT communication and network protocols, IoT application layers, transport layers, and cloud services. Additionally, they discussed the lack of a standardized lightweight encryption standard for IoT devices and the use of machine learning to enhance the security of IoT devices. As a final point, they discussed the security of blockchain systems and cellular networks. The article discusses gaps in current IoT security technology, which provides an indication of areas that need further research.
Harbi et al. [
32] provided an in-depth discussion of current trends in IoT security. At the outset, they discussed IoT devices, IoT architecture, IoT applications, and lessons learned from previous attacks. Threats to different layers of IoT security were also discussed, including those at the perception, network, and application layers. An in-depth discussion of emerging security solutions was conducted, including fog-based solutions, edge computing solutions, software-defined networks-enabled solutions, blockchain-based solutions, lightweight-cryptography-based solutions, homomorphic solutions, searchable solutions, and machine learning-based solutions. The discussion concluded with a discussion of security challenges and future directions. Despite providing a great deal of information regarding modern security solutions, this article does not go into detail regarding each topic.
Thakor et al. [
33] focuses on the use of lightweight cryptographic algorithms on devices with limited resources. The article presented a brief overview of IoT, followed by an examination of traditional cryptography algorithms, challenges, and security requirements. After a brief overview of general characteristics, hardware and software performance, and a deeper structure-wise classification of lightweight cryptography, the discussion progressed to a more detailed analysis of LWC. There have been comprehensive analyses and comparisons of a few selected algorithms, and this is an excellent article for understanding existing LWC. The article then goes on to provide an in-depth analysis of the various algorithms, including their strengths and weaknesses, as well as their overall performance. This allows readers to better understand the pros and cons of each algorithm and decide which one is best suited for their specific needs.
Thabit et al. [
34] have reviewed cryptography algorithms for enhancing the security of IoT devices. As a prelude to the discussion, a brief overview of IoT and its security was provided. In addition to cyber security and cipher methods, they explored the security trio. There was a detailed discussion of IoT architecture layers accompanied by graphical representations. They also discussed some of the applications of IoT cloud technology. Later in the article, they discuss IoT security challenges in terms of types of attacks, vulnerabilities, threats, and security requirements. They discussed the key challenges associated with using traditional cryptography in IoT devices, as well as lightweight cryptography in areas such as LWC usage, classification, and applications.
Singh et al. [
27] described advanced lightweight algorithms for IoT devices. There was a discussion of the ciphers used and the hashes calculated, as well as the performance matrix of a low-performance device and a high-performance device. Asymmetric and symmetric LWCs have been discussed, as well as LWCs for cloud computing and IoT. The final section discusses the hybrid lightweight algorithm (HLA), which is a combination of asymmetric and symmetric algorithms. To illustrate the practical aspects of the subject, some graphical representations and mathematical representations were used. This article is unique among others due to the introduction of hybrid LWC encryption, and it provides good insight for researchers who wish to develop a new LWC. The article concludes by discussing security challenges and countermeasures.
Tao et al. [
35] examined the use of hardware for secure data collection in IoT-based healthcare. After providing an overview of IoT technology, the article moved on to discuss security challenges and threat models. As they progress, they discuss how LWC technologies may be used to design secure data. Having discussed the technical aspects of LWC algorithms, the KATAN algorithm [
36] was selected. They discussed hardware ciphers, secret cipher share technology, and cipher design using KATAN as a cipher algorithm. An understanding of how to implement the cipher algorithm can be gained by reading this article’s implementation and performance analysis.
In
Table 1, some of the key points of the eight articles reviewed in this section are summarized. In light of these findings, IoT LWC plays an important role in ensuring the security of IoT devices. Several of the articles discussed the challenges associated with conventional cryptography in IoT devices with limited resources. There is no doubt that LWC algorithms are essential in order to encrypt data on IoT devices. It has been found that there has been no history of bibliometric analysis of the IoT lightweight cryptography problem. The purpose of this article is to examine recent trends in the field of IoT lightweight cryptography, including the nations and authors who were involved, the keywords that were most commonly used, and the collaborations that took place between researchers.
The above article’s contents are summarized as follows.
Table 1.
Summary of existing work.
Related Work | Source Journal | Year | Objectives |
---|
[34] | Elsevier Internet of Things | 2023 | Discuss importance of lightweight algorithms and compare cryptographic algorithms |
[29] | Future Generation Computer Systems | 2022 | Discuss state-of-the-art lightweight protocols, analyze contemporary ciphers, and evaluate recently developed block ciphers and stream ciphers. |
[30] | Sensors | 2022 | Review functional encryption application and cryptographic primitives |
[32] | IEEE Access | 2021 | Provide up-to-date vision to current IoT security. |
[33] | IEEE Access | 2021 | Compare existing algorithms in terms of some parameters and discuss demand and direction for new research in IoT lightweight cryptography. |
[31] | Sensors | 2020 | Present open research issues and future directions of IoT security. |
[35] | IEEE Internet of Things | 2018 | Provide detailed analysis comparing all cryptographic algorithms and their use in day-to-day life. |
[27] | Ambient intelligence and Humanized Computing | 2017 | Discuss how resource limitations of IoT affect its security and analyze some of the lightweight cipher algorithms and properties. |
5. Findings
Our goal is to understand the role of lightweight cryptography in IoT devices. In the current analysis, IoT, cryptography, and lightweight cryptography have shown a significant level of appearance. This shows the importance of LWC in IoT technology. Increasing the term frequency, keyword appearance, and co-occurrence of keywords are some of the indications that research in LWC is an emerging field of research. It is an ideal opportunity for a researcher to conduct research in this subject area.
A closer look at the collaboration world map and co-authorship by country show that India leads the research in IoT lightweight cryptography. Some of the leading researchers are based in India and have enthusiasm for technological studies with students. Some institutes’ high interest in IoT lightweight cryptography could be the reason behind its success. For researchers and investors seeking technological collaboration, India can be a good choice. In addition to China, the US, and the UK, South Korea, some Middle Eastern countries have shown interest in IoT lightweight cryptography. The research area of IoT LWC is receiving significant attention from all continents, except Africa and Eastern Europe. In that sense, it is a good sign that a new researcher understands the importance of this field.
A keyword analysis shows that IoT, cryptography, and lightweight cryptography are some of the most common words. That can be seen in word clouds and co-word networks. The same number of articles discussed these keywords, which indicates that they were discussed extensively. Over time, lightweight cryptography has shown significant increases in word frequency and trend topics. As a result, lightweight cryptography will become an important research area in the future.
Using author-related analyses such as the most relevant authors and authors’ productions over time, we can identify who is the leading researcher around LWC for IoT. Authors such as Archarya and Bansod have conducted several research studies in this area of study. It is evident that the author is continuing to work on their work over the course of time. Archarya is a researcher from the National Institute of Raipur and is working with a network of other researchers. As per the Scopus database, he has produced 118 articles, and his articles have been cited over 1100 times by 722 documents, making significant contributions to the industry. He appeared in our search 25 times, and lightweight cryptography is one of his major research fields. Bansod has also produced 20 articles with over 500 citations, and his major research fields are embedded systems, low-power cryptography, and lightweight cryptography.
There is no doubt that IEEE Access is the leading journal based on an analysis of journals. As per its cover page, it is a multidisciplinary, open-access, and rapid-review journal, which could be the reason behind its success of publishing in the IoT lightweight cryptography subject area. It has an impact factor of 4.82, and it is in the Q1 zone in the SCimago journal ranking with a score of 0.926. The lecture notes on electrical engineering and the lecture notes on computer science and IEEE Internet of Things and Sensors are also some of the strongest journals in the IoT LWC. This means that these are good journals to find information on IoT LWC for researchers who are just starting out. It is clear from these analyses that researchers will be able to identify which journals are suitable for publishing their articles in the IoT LWC based on these analyses.
These bibliometric analysis results indicate that there are several areas of future research to explore. With topics such as IoT security and IoT applications gaining prominence in modern times, IoT research is a major trend now, and many researchers are now focusing on IoT technology and IoT applications. However, niche areas of research such as IoT lightweight cryptography, which is a hot topic now, are the future trends, as most researchers are focusing on this area in depth. Researchers can continue to narrow down their research topic to areas such as cipher algorithms, block ciphers, and so on if they wish to go further and be more specific with their research.
These results provide a sound understanding of the importance of IoT cryptography as a solid foundation for IoT security. It provides a very comprehensive foundation for a decision-making tool for anyone interested in IoT lightweight cryptography.
5.1. Answers for Research Questions
Some of the research questions were set up at the beginning of the article with the intention to answer them based on results obtained from the analysis.
Collaboration world map and co-author by country are key analyses to answer this question. Both analyses show that India is the leading collaborator of IoT LWC researchers. China is the second largest country, and the USA, the UK, and South Korea are some other contributors to the IoT LWC research field. There are many middle-level players such as Saudi Arabia, Pakistan, France, Australia, Malaysia, Turkey, and Iran identified by the analysis.
It is possible to answer this question by analyzing several factors, including collaboration networks, most relevant authors, and author production over time. This is in accordance with the analysis mentioned above. Archarya, Bangsod, Li, and Mizra are some of the key contributors to the IoT LWC research field. Archarya. B played a significant role in this research field as he was identified as the key researcher by a number of analysis tools in this research.
According to the analysis of trend topics, thematic map, and factorial analysis, IoT and IoT lightweight cryptography can be identified as some of the trending research topics in the field of IoT. Raspberry Pi is another trending topic identified by the thematic map in this research.
Although IEEE Access is the leading journal for IoT LWC, Lecture Notes on Computer Science and Lecture Notes on Electronics Engineering are also significant contributors to the field. Another important journal on this topic is the IEEE Internet of Things Journal. MDPI’s Sensors is also another important journal that was identified by the most relevant journal analysis as the number four contributor.
According to the analysis of the data, there are certain clusters of co-relations that can be identified, such as the collaboration network. A total of 10 clusters have been identified, and 2 of them are leading research clusters led by Archarya and Bansod and another cluster with 9 researchers but no leader. It has also been reported that there are a few small clusters of members with two to six members as well.
Internet of Things, lightweight cryptography, security, cryptography, encryption, and authentication are some of the leading keywords used by authors as indicated by the word cloud, the co-word net, and the most relevant words based on word frequency over time. It is clear from the list of keywords that they have a strong relationship with each other.