Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
To cite this article: Mounika Jammula, Venkata Mani Vakamulla & Sai Krishna Kondoju
(2022) Hybrid lightweight cryptography with attribute-based encryption standard
for secure and scalable IoT system, Connection Science, 34:1, 2431-2447, DOI:
10.1080/09540091.2022.2124957
1. Introduction
Recently, IoT technology and wireless communications are rapidly growing, and users have
been using light-weight devices and small computing devices (Fu et al., 2022). The rea-
sons behind this are that these devices are cheaper, smaller, more powerful, and more
efficient in handling. Further, resource-constrained devices like RFID tags, contactless smart
cards, smart phones, wireless patient monitoring systems, and wireless sensor networks are
widely suffering from higher security issues (Rasori et al., 2022). The study of tradable invest-
ment products known as assets is known as security research. It focuses on determining
the appropriate value of certain commodities (i.e. stocks and bonds). These are often cate-
gorised as either derivative contracts, equity, or a combination of the two. Shareholders also
include tradable financial futures. One of the most significant changes in information and
sized block of plaintext and converts it into a unique string of bits using a one-way function.
One-way functions are essential components of many tools used in contemporary cryptog-
raphy. They are utilised in message authentication, digital signatures, and pseudorandom
generators. Furthermore, a one-way hash function is built in such a way that identifying a
text that hashes to a given value is problematic. The MAC system employs a technique that
encrypts messages using session encryption and the delivered regular text communication.
The information is next processed by the MAC method, which creates identification labels
with a specified distance. The message’s MAC is the consequence of the data processing.
Message authentication codes (Kumar et al., 2022a) are cryptographic primitives that take a
key and a lengthy string of bits from a message as input and output a unique shorter string
of bits. It is also known as the keyed hash function.
Three essential characteristics, namely security, cost, and performance, have posed
considerable obstacles in constructing lightweight cyphers (Prakasam et al., 2022). The
fundamental focus of modern lightweight cypher design is to create imaginative and
unorthodox structures that result in a cypher with a compact footprint, adequate speed,
low power consumption, and appropriate security. Several primitives (Zitouni et al., 2022)
were developed during the conference in response to the absence of acceptable cyphers
that are both efficient and secure for very limited contexts. With the growing popular-
ity of creating new lightweight primitives, it is critical to assess and quantify the cryp-
tographic security (Adeel et al., 2022) of these new structures. Even though extensive
attempts have been made in recent years to conduct a third-party examination of new
designs, the process of examining the security of novel architectures is still ongoing. One
of the most important fields of research in the theory of LWC is block cypher designa-
tor (Kumar, V., et al, 2022b). A lot of work has been done in this direction and developed
the ABE methods. However, the problems presented in the conventional ABE methods
are affecting the security standards. Initially, an ABE with outsourced decryption is cho-
sen to reduce the user’s calculation cost since the high cost of decryption increases with
the complexity of the access policy. Secondly, when a user’s attributes are changed, ABE
must allow attribute revocation in order to update the user’s access privileges in a timely
and effective manner. Third, if the data owner changes the access control policy, the pol-
icy update requirement must be satisfied while creating the ABE. The proposed LWC-ABE
scheme can provide whitebox traceability as well as policy updates to tackle the three
challenges listed above and, as a result, can address the anticipated needs of IoTs. RFID
tags, detectors, as well as contactless smart cards are examples of compact, low-power,
and low-footprint devices that can benefit more from the usage of lightweight cryp-
tography. In order to guarantee safety and confidentiality in IoT applications, it can be
employed. Securing the keys is the most essential factor in IoT applications with respect
to ciphertext authentication model. However, in the existing systems, the problems are
elliptic curve discrete logarithm problem, security hashing functions, security attacks and
so on.
The major contributions of this work are:
• A novel flexible and useful LWC-ABE method is developed by adopting the ChaCha and
Playfair encryptions for high secured IoT environment.
• The proposed LWC-ABE scheme supports simultaneous policy updating, attribute revo-
cation and outsourcing decryption properties.
2434 M. JAMMULA ET AL.
• The proposed LWC-ABE contains only multiple trusted authority environment, which is a
bottleneck in IoT servers and IoT devices has the flexibility to change their access policy.
• The simulation results shows that the proposed LWC-ABE resulted in reduced encryption
and decryption times for multi users, different message sizes scenarios as compared to
conventional approaches.
Rest of the paper is organised as follows: section 2 deals with the survey on conven-
tional encryption and cryptographic methods with problem statement. section 3 deals
with the detailed analysis of proposed LWC-ABE method. Section 4 deals with the results
and discussion with performance analysis. Section 5 deals with the conclusion and future
enhancements.
2. Literature survey
This section gives a survey of conventional encryption and cryptographic methods used in
the IoT environment. An enhanced secure IoT (ESIT) (Nayak & Swain, 2022) has been devel-
oped by using hybrid elliptic curve cryptography (HECC) methods. Asymmetrical public-key
cryptography using a shared secret key type is required as the hyper elliptic curve crypto-
graphic technique (HECC). Each client has a set of public and private keys. While a public key
is employed to secure data and verify signatures, a secret key is utilised to decipher or gen-
erate signatures. Hyper elliptic curves (HECC) are elliptic curves that are especially suitable
to cryptography. A generalisation of elliptic curves, are algebraic curves. It differs from the
HECC in that it must show that it is aware of the lightweight cryptography realisation appli-
cation restrictions and change needs accordingly. Size, performance, safety, and energy are
examples of such limits. Further, an LWC-based authentication scheme has been devel-
oped in (Zhang et al., 2022), which is based on consortium blockchain for cross-domain
IoT environment. As a result, it can be used to create security features that are equivalent.
The stiffness of the discrete logarithmic problem determines the cryptographic strength of
ECC-based LWC. This idea, combined with a security protocol, can be utilised to offer key
installation, authentication, encryption, and service signature. It is used in Lightweight and
Anonymous Mutual Authentication Protocol (Wang et al., 2022). For periphery IoT networks
with physically unclonable functionality, a compact, anonymously reciprocal authentica-
tion system is used, including zero secret key storing as well as a massive number of
pseudonyms. The preparation of the sample, the enrolment process, as well as the case
of security make up the system’s three overall processes. A lightweight and anonymous
mutual authentication protocol is utilised for edge IoT nodes with physically unclonable
functionality, with zero shared secret storage and a high number of pseudonyms. To
adapt to the noisy environment, the protocol employs the reverse fuzzy extractor, and the
additional subprotocol is included to improve resistance to the desynchronisation threat.
Sensors are used to safely gather medical information from the patient’s body and transmit
it to the healthcare system. Different applications call for varying levels of security, where a
resource’s scarcity is a key factor. The ideal candidate algorithm for the proposed healthcare
system is inferred from the investigation (Alassaf et al., 2017). These solutions can then be
applied in the limited environment for applications such as health care, defense, military,
and security. In order to maximise security applications, (Alkhudaydi & Gutub, 2020) sug-
gests fusing enhanced Arabic text steganography with lightweight encryption. Using every
CONNECTION SCIENCE 2435
frequent diacritic that occurs naturally in Arabic, the study attempts to conceal encrypted
secret information within Arabic stego-cover writings.
Researchers further concentrated on different types of ABE (Perazzo et al., 2021) meth-
ods that are lightweight and suitable for applications with limited resources. One reason
for adoption of ABE is that it minimises weight generation during key generation, while
the other could be design and implementation decisions. Cryptographers examine which
ECC implementations are most commonly used and deemed lightweight. But the conven-
tional ABE methods are suffering from the various attacks. Therefore, modern cryptography
extensively using Ciphertext-Policy ABE (CP-ABE) was proposed (Chinnasamy et al., 2022).
It uses a very small set of encryption and decryption keys to provide the same level of secu-
rity as RSA. The security of CP-ABE suffers from the elliptic curve discrete logarithm problem.
Distinct types of pairing, like Weil pairing, Tate pairing, and bilinear pairing models, are also
not supported by CP-ABE, which resulted in reduced security standards.
Alassaf and Gutub (2019) analyzes the effectiveness of three reliable candidate encryp-
tion algorithms, notably AES, SPECK, and SIMON. With the availability of internet of things
(IoT) support, short-term monitoring and emergency notification of healthcare signals
are becoming more inexpensive. Data confidentiality is essential, necessitating the use of
encryption. The robust encryption method is in conflict with the limits on memory, calcu-
lation speed, power consumption, and compact device sizes. Multimedia data sharing via
unsecured networks will become more necessary as the Internet of Things (IoT) develops.
The limited resources of an IoT platform prevent the use of traditional methods for data
encryption (Alassaf et al., 2019). The suggested method was compared against AES and
the original SIMON block-encrypting techniques. On an encryption algorithm, the vertices
of vital importance to ensure are two-dimensional. Let K be a field with feature p that is
faultless (i.e. K p = K), a definite mathematical enclosure of K, and let n be a number that is
positive definite to p. In arithmetic, a Tate pairing is anyone of numerous highly associated
encoded information predicated on Tate duality connections that include mathematical
techniques or abelian morphologies and are often across localised or limited areas. Imag-
inative techniques for activities like one-round three-party key exchange, identity-based
cryptography, as well as aggregated authentication have been created using bilinear pair-
ings. The Tate pairing may be used to create appropriate bilinear pairings for a selection of
elliptic curves.
Other than CP-ABE, pairing-based cryptography involves many more applications, e.g.
signature techniques, key establishment algorithms with ABE methods, privacy-enhancing
schemes using anonymous credentials, etc. Pairing-based Identity-based encryption (IBE),
which enables a sender to encrypt a communication without having a receiver’s public key
to have been authenticated and transmitted earlier, has been established using cryptogra-
phy. IBE creates a public key using some type of identification for a person (or business).
In (Li et al., 2022), authors proposed the control, ciphertext-policy weighted attribute-
based encryption (CP-WABE) for IoT environments. The use of a projective homogenous
co-ordinate system has been proposed by cryptographers to reduce the inversion cost
due to arithmetic operations like point addition and points doubling on elliptic and ellip-
tic type curves. In (Zeng et al., 2021), the authors established a trilinear pairing map of
rank 3 on restricted free R-modules (R is a commutative ring) based policy-hiding attribute-
based keyword search and data sharing scheme (PH-ABKS-DS) environment. The multiple
key establishment approach was used for hashing purposes. Besides, it does not require
2436 M. JAMMULA ET AL.
a digital signature algorithm for user confirmation. But these methods are suffering from
the same policy preserving problems and token generation issues. In (Ge et al., 2022),
authors suggested a Diffie-Hellman problem-based key setup mechanism using Revoca-
ble Attribute-Based Encryption with Data Integrity (RABE-DI). A revocable attribute-based
encryption with data integrity (RABE-DI) system maintains data integrity of 329 the origi-
nal ciphertext and the cancelled ciphertext if an adversary A has the advantage. A RABE-DI
system consists of the original data owner, a cloud server, an authoritative party, and the
receivers. In addition, after compiling the key setup scheme, this plan illustrates that the
two users can share different keys for communication. But this method suffers from the
white box traceability problems. In (Xiong et al., 2021), the authors demonstrate a compe-
tent authenticated key formation strategy that recompiles in less time than Harn’s protocol
using Unbounded and Efficient Revocable based ABE (UER-ABE). Because the accompa-
nying protocol relies on self-linear maps, the available shared keys (in numbers) in the
following scheme are greater than those in conventional ABE.
In, Hassan and Gutub (2021) the original image will be scaled up using the already-
existing enhanced neighbour mean interpolation (ENMI) and modified neighbour mean
interpolation (MNMI) techniques. The critical bits are then masked by effectively utilising
the embedding approach. To assess the effectiveness of the suggested system, experi-
ments were conducted on eight common images. One of the important areas of e-security
study and application is user authentication. In order to maintain a suitable level of secu-
rity while accessing computers, this study suggests developing an authentication method
that combines a graphical CAPTCHA with an AES encrypted hash password. To minimise
the responsibility of having to enter a password several times, (Kheshaifaty & Gutub, 2021)
provide a three-layered security system that combines very effective protection methods.
Further, revocable multi-authority-based ABE (RMA-ABE) (Ming et al., 2021) has been
developed to overcome the expressiveness problems presented in the conventional RABE-
DI and UER-ABE methods. This method introduces two lightweight cryptographic schemes,
of which one is independent of hash functions. In addition, revocable CP-ABE (Guo et al.,
2021b) has been developed to reduce the computational complexity problems presented
in conventional revocable methods. This method effectively reduces repayable chosen-
ciphertext attacks. This method later takes the advantage of being more lightweight than
the previous one because it uses self-pairing together with ABE. Further, data access con-
trol methods (Lu et al., 2021) have been developed for the IoT networks by combining the
ABE and blockchain methods. Here, blockchain technology is used to reduce the num-
ber of bottleneck attacks. In addition, dual membership-based ABE (DM-ABE) (Lu et al.,
2022a) is developed by using secure decision of membership (SDM) protocols. We create
the Secure Decision of Membership (SDM) encryption method to safely decide things for
double members, that is, PM and NM. The analytical method, which may construct com-
pressed cryptography encapsulation of collections, is the main component of the method.
Once pairings have been generated properly, they can form fields of finite order that are suf-
ficiently large to build discrete logarithmic problems computationally but sufficiently small
for making efficient computations. The Searchable ABE (Lu et al., 2022b) is widely used in
lightweight web apps that interact with data storage and transmission using wireless com-
munication applications, which are vulnerable to hackers. These functions assign pairs of
elliptic curve points into the elements of the field with finite order. In (Hu et al., 2022), the
authors developed the flexible and complex data access policy-based ABE. However, this
CONNECTION SCIENCE 2437
method suffers from a variety of attacks (El Hadj Youssef et al., 2022), which include mod-
ification attacks, perfect forward secrecy attacks, and known key security attacks. Faster
computations and memory, power, and bandwidth savings result, which are especially rel-
evant in restricted contexts. More importantly, when security requirements grow, LWC-ABE
gains a competitive advantage over its competitors.
3. Proposed methodology
An LWC is a technique by which any information or message is exchanged securely between
two or more remote parties through a communication network under the surveillance of an
eavesdropper. Every cryptographic scheme consists of two processes, namely encryption
and decryption. In the encryption process, a text message is encrypted (encoded) into a
cipher text message, while during the decryption process, the encoded cipher text message
is again decrypted (decoded) into the original text message. Moreover, every cryptographic
scheme is either based on a pair of keys (public and private) or a single (shared) key which
is/are used to convert the text message into cipher text and vice-versa. The proposed LWC-
ABE method supports high expressiveness, access policy updates, large attribute domains,
and white box traceability properties. White-box traceability is the process by which the
system may identify the malicious user if a user in the system intentionally leaks their
decryption key to an unauthorised user using the information included in the key. The
features of the proposed LWC-ABE method are illustrated as follows:
• Large attribute domain: the number of authorised institutions influences the size of pub-
lic parameters, which does not rise in a linear manner with respect to attributes. There is
no need to update the system attributes if the system is formed.
• Policy modification: The data owners continuously change the policy access specifi-
cations and generate the different ciphertexts to meet the higher security standards.
Further, according to policy modification, the data owners also fine tune the data access
properties in a flexible manner.
• The system has the potential capability to monitor malevolent users who unlawfully dis-
tribute private keys. The white box traceability creates a list of users with their access
permissions, which helps to identify unauthorised users with low computational cost.
• Many authorised authorities: The data integrity problems are solved by introducing the
multiple authority system, which also solves the issue of the single authority’s insufficient
credibility. Human inaccuracy, whether intentionally or inadvertent, may undermine
data integrity. Transfer errors, such as unintentional alterations or data compromise
when moving information between devices. vulnerabilities, malware/viruses, hacking,
and other online dangers are the main causes of data integrity.
• It allows for any monotonous access structure and any customisable access control
access approach.
Figure 1 depicts the proposed LWC-ABE framework with trusted party, system party, data
users, data owners, attribute authorities, and cloud storage providers (CSP) as fundamental
operational blocks. A communications service provider (CSP) provides telecommunica-
tions services or a combination of information and media services, content, entertainment,
2438 M. JAMMULA ET AL.
and application services across networks, utilising network infrastructure as a rich, opera-
tional platform. Initially, the public parameters are generated by invoking the system setup.
Further, some of the public parameters are delivered to trusted parties, data users, data
owners, and attribution authorities in the first instance. In addition, constants, counter
values, nonces, and seed keys are some of the PPs generated for the ChaCha encryption
algorithm. The attribute authorities then utilise the authority establishment procedure to
produce public keys and deliver them to trusted parties, data users, and data owners. Fur-
thermore, if the data users have appropriate authorisation, the attribute authorities-based
characteristics will be assigned to them based on their request. The data owner produces
ciphertext using ChaCha encryption for the encrypted communication and transfers it to
the CSP. Further, the data out from CSP is again encrypted by using the Playfair algorithm.
Further, the policy update key is generated by the data owner and transferred to the CSP
during the access policy change scenario. According to policy access change property, data
owners can implement either ChaCha encryption or Playfair encryption, and both encryp-
tions can be implemented parallelly. The ciphertext will then be updated in the cloud
storage based on the chosen encryption method. Following that, if the data user’s charac-
teristics match the ciphertext access policy, they transfer the secret key to a trusted party,
which produces the accurate secret key. Finally, the trusted party performs the decryption
procedure and generates the final decrypted message. During this process, finally, if there
is a disagreement or suspicion, the trusted party uses the tracing algorithm and transmits
the suspicious user’s ID (GID) to the attributed authorities.
CONNECTION SCIENCE 2439
shown in Figure 2 (a) to QRF, instead of applying the input seeds in a column wise manner.
Further, apply input seeds in an alternate form as shown in Figure 2(b), instead of apply-
ing the input seeds in a row-wise manner. This new sequence of updates leads to greater
input dispersion, which increases the difficulty of critical attacks. Finally, the XOR opera-
tion is performed between the IoT sensor data and the keystream, which generates the
ciphertext.
Figure 3. Polybius Square, (a) row based ciphertext generation, (b) column based ciphertext genera-
tion, (c) horizontal opposite corner based ciphertext generation.
first effective digraph substitution cipher. A cipher that uses a digraphic substitution from
a single alphabet square that starts with the letters of a keyword and continues with the
letters of the remaining alphabet, excluding J. In contrast to standard ciphers, we encrypt
a pair of alphabets (digraphs) rather than a single alphabet in playfair cipher. The Playfair
cypher utilises Polybius Square for performing the encryption operation, which acts as a
key. Alphabet characters are placed in a square matrix for the Polybius square cypher. The
row x column concept is used to protect the message by replacing every character with a
two-digit integer (every of varies from 1 to 5 owing to the alphanumeric characters being
put in a 5 × 5 grid). In the polybius square, the alphabets should not be repeated and the
matrix size is 5 × 5 with 25 elements. Further, the polybius square does not contain the let-
ter J, which causes overlapping of bits in plain text. Therefore, if the letter “J” is present in
the keystream, then it is replaced with the letter “I”. In addition, the letters in the polybius
square should not be repeated. Then, the encryption process is performed as follows:
Step 1: The plaintext is divided into a multiple number of diagraphs, which are generated
by combing the two letters in the plaintext. Further, the letter “Z” was also introduced,
when the diagraph contains only one odd letter. For example, consider “INSTRUMENTS”
as plaintext, which contains 11 letters. So, the bogus letter “Z” is added at the LSB end of
the plaintext, which results in the outcome “INSTRUMENTSZ”.
Step 2: If the diagraph contains repeated letters or the same letters twice, side by side,
then assign the unknown letter “X” in the LSB position of the diagraph. For example, con-
sider “COMMUNICATE” as plaintext, then it is divided into digraphs as CO, OM, MM, MU,
UN, NI, IC, CA, AT, TE. Here, the “MM” digraph contains the same letters, so it is converted as
“MX”.
Step 3: For example, consider “MONARCH” as a polybius square as shown in Figure 3 (a),
which acts as a key text. The empty slots in the square are replaced with non-repeated
alphabets in alphabetical order. Here, write the letters of the supplied keyword in the first
row (from left to right). If there are any duplicate letters in the keyword, avoid them. This
indicates that a letter will only be examined once. Fill in the remaining letters in alphabetical
sequence after that.
Step 4: If the plaintext digraph is present in the same row of polybius square, then the
ciphertext is generated by considering the immediate right-side letters of the digraph. If the
letters are not presented on the right side, then consider the initial letter of the same row.
Consider the plaintext “INSTRUMENTSZ”, which contains the “ST” diagraph in the fourth row
of squares, as shown in Figure 3(a). So, for the plaintext letter “S”, ciphertext is generated as
“T” and for the plaintext letter “T”, ciphertext is generated as “L”.
2442 M. JAMMULA ET AL.
Step 5: If the plaintext digraph is in the same column of the polybius square, the ciphertext
is generated by considering the digraph’s immediate below letters. If the letters are not
presented on the right side, then consider the initial letter of the same column. Consider
the plaintext “INSTRUMENTSZ”, which contains the “ME” diagraph in the first column of the
square, as shown in Figure 3(b). So, for the plaintext letter “M”, ciphertext is generated as
“C” and for the plaintext letter “E”, ciphertext is generated as “L”.
Step 6: If the step 5 and step 6 situations do not occur and digraph letters are presented in
different columns and rows, then consider the M∗N sub matrix. Furthermore, the digraph
letters should be present inside the M∗N matrix. Finally, the ciphertext is generated for that
ciphertext by considering the horizontal opposite corner letters of plain text. Consider the
plaintext “INSTRUMENTSZ”, where the “NT” diagraph is not present in a single row or col-
umn of squares, as shown in Figure 3(c). So, the 4∗3 submatrix is created with N and T as
elements. Finally, for the plaintext letter “N”, ciphertext is generated by considering the hor-
izontal opposite corner letter as “R” and for the plaintext letter “T”, ciphertext is generated
by considering the horizontal opposite corner letter as “Q”.
Step 7: Repeat the process for other digraphs and generate the ciphertext.
Step 8: The decryption technique follows the same procedures as encryption, but in reverse
order. The cypher is symmetric for decryption (move up along columns and left along rows).
The plain text recipient has the same.
a digraph, rather than an individual character. It first generates a 5∗5 vector reference
table. Letters in the grid serve as the encrypted message for information. Further, Figure
4 presents the encryption time estimation of 10 random users in an IoT environment. Simi-
larly, Figure 5 presents the decryption time estimation of 10 random users in the same IoT
network. The proposed LWC-ABE method resulted in reduced encryption and decryption
times in the multiuser with multi-authority scenario. The conventional DM-ABE [27] and CP-
ABE [25] methods are facing issues in access policy, which result in abnormal increments of
key generation time across each user and cause increased cryptographic times Tables 4
and 5.
2444 M. JAMMULA ET AL.
Table 6 illustrates that the proposed LWC-ABE requires less encryption and decryption
time than CP-WABE [20], DM-ABE [24], DM-ABE [21], DM-ABE [27], and CP-ABE [25] for var-
ious message sizes. The proposed method generates the public key and private keys in a
parallel manner, and key sizes are also automatically changed by attribute authorities based
on message size, which results in reduced encryption and decryption times.
5. Conclusion
This article implements the flexible and useful LWC-ABE method for eliminating the unusual
attacks generated in the IoT environment. Furthermore, by using the ChaCha and Play-
fair encryptions, LWC-ABE reduces hardware resources such as power consumption and
implements higher security standards in the IoT network. The proposed scheme supports
CONNECTION SCIENCE 2445
Disclosure statement
No potential conflict of interest was reported by the author(s).
References
Adeel, A., Ali, M., Khan, A. N., Khalid, T., Rehman, F., Jararweh, Y., & Shuja, J. (2022). A multi-attack
resilient lightweight IoT authentication scheme. Transactions on Emerging Telecommunications
Technologies, 33(3), e3676. https://doi.org/10.1002/ett.3676
Alassaf, N., Alkazemi, B., & Gutub, A. (2017). Applicable light-weight cryptography to secure medi-
cal data in IoT systems. Journal of Research in Engineering and Applied Sciences (JREAS), 2(2), 50–58.
https://doi.org/10.46565/jreas.2017.v02i02.002
Alassaf, N., & Gutub, A. (2019). Simulating light-weight-cryptography implementation for IoT health-
care data security applications. International Journal of E-Health and Medical Communications
(IJEHMC), 10(4), 1–15. https://doi.org/10.4018/IJEHMC.2019100101.
Alassaf, N., Gutub, A., Parah, S. A., & Al Ghamdi, M. (2019). Enhancing speed of SIMON: A light-
weight-cryptographic algorithm for IoT applications. Multimedia Tools and Applications, 78(23),
32633–32657. https://doi.org/10.1007/s11042-018-6801-z
Alkhudaydi, M. G., & Gutub, A. A. (2020). Integrating light-weight cryptography with diacritics arabic
text steganography improved for practical security applications. Journal of Information Security and
Cybercrimes Research, 3(1), 13–30. https://doi.org/10.26735/FMIT1649
Chinnasamy, P., Deepalakshmi, P., Dutta, A. K., You, J., & Joshi, G. P. (2022). Ciphertext-Policy attribute-
based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT
system. Mathematics, 10(1), 68. https://doi.org/10.3390/math10010068
El Hadj Youssef, W., Abdelli, A., Dridi, F., Brahim, R., & Machhout, M. (2022). An efficient lightweight
cryptographic instructions set extension for IoT device security. Security and Communication Net-
works, 2022, 1–17. https://doi.org/10.1155/2022/9709601
Fu, X., Ding, Y., Li, H., Ning, J., Wu, T., & Li, F. (2022). A survey of lattice based expressive attribute-based
encryption. Computer Science Review, 43, 100438. https://doi.org/10.1016/j.cosrev.2021.100438
Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., & Fang, L. (2022). Revocable attribute-based encryption with
data integrity in clouds. IEEE Transactions on Dependable and Secure Computing, 9(5), 2864–2872.
https://doi.org/10.1109/TDSC.2021.3065999
2446 M. JAMMULA ET AL.
Guo, L., Yang, X., & Yau, W. C. (2021a). TABE-DAC: Efficient traceable attribute-based encryp-
tion scheme with dynamic access control based on blockchain. IEEE Access, 9, 8479–8490.
https://doi.org/10.1109/ACCESS.2021.3049549
Guo, R., Yang, G., Shi, H., Zhang, Y., & Zheng, D. (2021b). O 3-R-CP-ABE: An efficient and revoca-
ble attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet of Things
Journal, 8(11), 8949–8963. https://doi.org/10.1109/JIOT.2021.3055541
Hassan, F. S., & Gutub, A. (2021). Efficient image reversible data hiding technique based
on interpolation optimization. Arabian Journal for Science and Engineering, 46(9), 8441–8456.
https://doi.org/10.1007/s13369-021-05529-3
Hu, S., Wang, X., He, H., & Zhong, T. (2022). Complex and flexible data access policy in attribute-based
encryption. The Journal of Supercomputing, 78(1), 1010–1029. https://doi.org/10.1007/s11227-021-
03867-5
Jammula, M., Vakamulla, V. M., & Kondoju, S. K. (2022). Performance evaluation of lightweight cryp-
tographic algorithms for heterogeneous IoT environment. Journal of Interconnection Networks,
2141031. https://doi.org/10.1142/S0219265921410310.
Kheshaifaty, N., & Gutub, A. (2021). Engineering graphical captcha and AES crypto hash functions for
secure online authentication. Journal of Engineering Research. https://doi.org/10.36909/jer.13761
Kumar, A., Ottaviani, C., Gill, S. S., & Buyya, R. (2022a). Securing the future internet of things with post-
quantum cryptography. Security and Privacy, 5(2), e200. https://doi.org/10.1002/spy2.200
Kumar, V., Kumar, R., Khan, A. A., Kumar, V., Chen, Y. C., & Chang, C. C. (2022b). RAFI:
Robust authentication framework for IoT-based RFID infrastructure. Sensors, 22(9), 3110.
https://doi.org/10.3390/s22093110
La Manna, M., Treccozzi, L., Perazzo, P., Saponara, S., & Dini, G. (2021). Performance evaluation of
attribute-based encryption in automotive embedded platform for secure software over-the-air
update. Sensors, 21(2), 515. https://doi.org/10.3390/s21020515
Li, H., et al. (2022). "An efficient ciphertext-policy weighted attribute-based encryption for the internet
of health things.”. IEEE Journal of Biomedical and Health Informatics, 26(5), 1949–1960. https://doi.
org/10.1109/JBHI.2021.3075995
Lu, H., Yu, R., Zhu, Y., He, X., Liang, K., & Chu, W. C. C. (2022a). Policy-driven data sharing over attribute-
based encryption supporting dual membership. Journal of Systems and Software, 188, 111271.
https://doi.org/10.1016/j.jss.2022.111271
Lu, X., Fu, S., Jiang, C., & Lio, P. (2021). âĂIJA fine-grained IoT data access control scheme com-
bining attribute-based encryption and blockchain.”. Security and Communication Networks, 2021,
5308206. https://doi.org/10.1155/2021/5308206
Lu, Z., Guo, Y., Li, J., Jia, W., Lv, L., & Shen, J. (2022b). Novel searchable attribute-based
encryption for the internet of things. Wireless Communications and Mobile Computing, 2022,
8350006. https://doi.org/10.1155/2022/8350006.
Ming, Y., He, B., & Wang, C. (2021). Efficient revocable multi-authority attribute-based encryption for
cloud storage. IEEE Access, 9, 42593–42603. https://doi.org/10.1109/ACCESS.2021.3066212
Nayak, M. K., & Swain, P. K. (2022). ESIT: An enhanced lightweight algorithm for secure internet of
things. In Iot and analytics for sensor networks (pp. 107–116). Nayak, P., Pal, S., Peng, SL. (eds),
Springer, https://doi.org/10.1007/978-981-16-2919-8_10
Oberko, P. S. K., Obeng, V.-H. K. S., & Xiong, H. (2022). A survey on multi-authority and decentral-
ized attribute-based encryption. Journal of Ambient Intelligence and Humanized Computing, 13(1),
515–533. https://doi.org/10.1007/s12652-021-02915-5
Perazzo, P., Righetti, F., La Manna, M., & Vallati, C. (2021). Performance evaluation of attribute-based
encryption on constrained IoT devices. Computer Communications, 170, 151–163. https://doi.org/
10.1016/j.comcom.2021.02.012
Prakasam, P., Madheswaran, M., Sujith, K. P., & Sayeed, M. S. (2022). Low latency, area and optimal
power hybrid lightweight cryptography authentication scheme for internet of things applications.
Wireless Personal Communications, 126, 351–365. https://doi.org/10.1007/s11277-022-09748-1
Rana, M., Mamun, Q., & Islam, R. (2022). Lightweight cryptography in IoT networks: A survey. Future
Generation Computer Systems, 129, 77–89. https://doi.org/10.1016/j.future.2021.11.011
CONNECTION SCIENCE 2447
Rasori, M., La Manna, M., Perazzo, P., & Dini, G. (2022). A survey on attribute-based encryption schemes
suitable for the internet of things. IEEE Internet of Things Journal, 9(11), 8269–8290. https://doi.
org/10.1109/JIOT.2022.315403
Tu, S., Waqas, M., Huang, F., Abbas, G., & Abbas, Z. H. (2021). A revocable and outsourced multi-
authority attribute-based encryption scheme in fog computing. Computer Networks, 195, 108196.
https://doi.org/10.1016/j.comnet.2021.108196
Wang, H., Meng, J., Du, X., Cao, T., & Xie, Y. (2022). Lightweight and anonymous mutual authentica-
tion protocol for edge IoT nodes with physical unclonable function. Security and Communication
Networks. Jan, 4, 2022. https://doi.org/10.1155/2022/1203691.
Xiang, X., & Zhao, X. (2022). Blockchain-assisted searchable attribute-based encryption for e-health
systems. Journal of Systems Architecture, 124, 102417. https://doi.org/10.1016/j.sysarc.2022.102417
Xiong, H., et al. (2021). Unbounded and efficient revocable attribute-based encryption with adap-
tive security for cloud-assisted internet of things. IEEE Internet of Things Journal, 9(4), 3097–3111.
https://doi.org/10.1109/JIOT.2021.3094323
Zeng, P., Zhang, Z., Lu, R., & Choo, K. K. R. (2021). Efficient policy-hiding and large universe attribute-
based encryption with public traceability for internet of medical things. IEEE Internet of Things
Journal, 8(13), 10963–10972. https://doi.org/10.1109/JIOT.2021.3051362
Zhang, Y., Luo, Y., Chen, X., Tong, F., Xu, Y., Tao, J., & Cheng, G. (2022). A lightweight authentica-
tion scheme based on consortium blockchain for cross-domain IoT. Security and Communication
Networks, 2022(6), 1–15. https://doi.org/10.1155/2022/9686049
Zitouni, N., Sedrati, M., & Behaz, A. (2022). Comparing lightweight algorithms to secure constrained
objects in internet of things. In Interactive mobile communication, technologies and learning (pp.
1040–1051). In: Auer, M. E., Tsiatsos, T. (eds.) New Realities, Mobile Systems and Applications.
Springer.