A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT

Lightweight cryptography has a major role in cybersecurity for smart cities and the Internet of Things, and it can be further secured by the development of lightweight encryption algorithms that work in restricted devices and with limited specifications such as wireless network sensors. The restricted devices have a small memory and a simple processor and limited power, and to secure them need lightweight cryptography algorithms and take into account the limited specifications at the same time. In addition to the importance of decreasing memory and power consumption in lightweight encryption algorithms are important, increasing security is more important. When the lightweight cryptography algorithm more secure and less consumption of memory and energy that means it is better and more efficient. In this article, we have developed a lightweight cryptographic algorithm, and through studies, analysis and comparison with other lightweight cryptography algorithms show that the proposed algorithm is more efficient.

___

1. United Nations, "2018 Revision of World Urbanization Prospects," United Nations: Department of Economic and Social Affairs, Available from URL: https://www.un.org/development/desa/publications/2018-revision-of-world-urbanization-prospects.html.

2. P. W. Singer, A. Friedman, "Cybersecurity and Cyberwar," Oxford University Press, New York, p. 320, 2014.

3. Information Technology Laboratory: Computer Security Resource Center, "Lightweight Cryptography," The National Institute of Standards and Technology (NIST), Available from URL: https:// csrc.nist.gov/projects/lightweight-cryptography.

4. W. Stallings, "Cryptography and Network Security: Principles and Practice," 5th Ed. Pearson, New York, 2010, p. 744.

5. M. Usman, I. Ahmed, M. I. Aslam, S. Khan and U. A. Shah, "SIT: A Lightweight Encryption Algorithm for Secure Internet of Things," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 1, pp. 402-411, 2017.

6. E. Barker, "National Institute of Standards and Technology: Special Publication," part 1, revision 4, 800-57, 2016.

7. V. R. Andem, "A Cryptanalysis of the Tiny Encryption Algorithm," M.Sc. Thesis, The Graduate School, University of Alabama, Alabama, 2003.

8. P. S. L. M. Barreto and V. Rijmen, "The KHAZAD Legacy-Level Block Cipher," vol. 97, pp. 1-20, 2000.

9. P. Ramasamy, V. Ranganathan, S. Kadry and et.al, "An Image Encryption Scheme Based on Block Scrambling," Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map. Entropy, vol. 21, no. 7, pp. 1-7, 2019.

10. H. N. Abdullah, "Image Encryption Using Hybrid Chaotic Map," International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani, Iraq, pp. 121-125, 2017

11. G. Maddodi, A. Awad, D. Awad, et.al, "A New Image Encryption Algorithm Based on Heterogeneous Chaotic Neural Network Generator and DNA Encoding," Springer, vol. 77, no. 19, pp. 24701- 24725, 2018.

12. T. Kaur, R. Sharma, "Security Definitive Parameters for Image Encryption Techniques," International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 5, pp. 109-112, 2013.