{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:16:35Z","timestamp":1770336995670,"version":"3.49.0"},"reference-count":70,"publisher":"World Scientific Pub Co Pte Ltd","issue":"Supp01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Inter. Net."],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:p> Internet-of-Things (IoT) is an advanced intelligent infrastructure, which is formed by using multiple self-organizing devices. Here, the devices are utilized to examine the network and transfers the important information over internet. In this huge network, the unknown devices can create various attacks, thus the security and privacy of data is the major concerns. The major limitation in the IoT network is the devices are battery powered, so they can store low inbuilt resources. Thus, it is necessary to identify more resource optimized and security related solutions to address the problems generated in the network. In addition, the resources of the devices are consuming in higher speed due to the complex cryptography algorithms to maintain. Further, it is necessary to identify the suitable cryptography procedure for an automated IoT network along with data integrity. Therefore, this article aims to introduce the detailed survey on various cryptographic methods with their operational behavior such as asymmetric key cryptography (AKC) and symmetric key cryptography (SKC). This survey mainly focused on the cryptographic methods with respect to various attacks such as forgery and chosen-cipher text, denial of service; replay man-in-the middle, key reset, device capture and brute force attacks. Hence, the lightweight cryptography (LWC) is the prominent solution to mitigate all these attacks by using the deep learning methods and can maintain the higher security standards with the lower resource utilization in IoT environment. <\/jats:p>","DOI":"10.1142\/s0219265921410310","type":"journal-article","created":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T05:45:43Z","timestamp":1643521543000},"source":"Crossref","is-referenced-by-count":7,"title":["Performance Evaluation of Lightweight Cryptographic Algorithms for Heterogeneous IoT Environment"],"prefix":"10.1142","volume":"22","author":[{"given":"Mounika","family":"Jammula","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India"}]},{"given":"Venkata Mani","family":"Vakamulla","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Warangal, Telangana, India"}]},{"given":"Sai Krishna","family":"Kondoju","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India"}]}],"member":"219","published-online":{"date-parts":[[2022,1,28]]},"reference":[{"key":"S0219265921410310BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02672-x"},{"key":"S0219265921410310BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761951"},{"key":"S0219265921410310BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2738-3_2"},{"key":"S0219265921410310BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2839593"},{"key":"S0219265921410310BIB005","first-page":"100093","author":"Siddiqui F.","year":"2019","journal-title":"Internet of Things"},{"issue":"8","key":"S0219265921410310BIB006","first-page":"3958","volume":"10","author":"Kum S. W.","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"S0219265921410310BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"S0219265921410310BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"S0219265921410310BIB009","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9122152"},{"key":"S0219265921410310BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8242006"},{"key":"S0219265921410310BIB011","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020319"},{"key":"S0219265921410310BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10728-4_8"},{"key":"S0219265921410310BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"S0219265921410310BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2017.8269731"},{"key":"S0219265921410310BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978525"},{"key":"S0219265921410310BIB016","first-page":"1","author":"Goyal T. K.","year":"2019","journal-title":"IETE Journal of Research"},{"key":"S0219265921410310BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002815"},{"key":"S0219265921410310BIB018","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4139"},{"key":"S0219265921410310BIB019","volume":"20","author":"Atkins D.","year":"2015","journal-title":"presentation at the NIST LWCWorkshop"},{"key":"S0219265921410310BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.015"},{"key":"S0219265921410310BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970499"},{"key":"S0219265921410310BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.002"},{"key":"S0219265921410310BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03318-7"},{"key":"S0219265921410310BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102159"},{"key":"S0219265921410310BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07613-7"},{"key":"S0219265921410310BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS50287.2020.9202230"},{"key":"S0219265921410310BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116441"},{"key":"S0219265921410310BIB028","doi-asserted-by":"publisher","DOI":"10.1080\/09747338.2020.1769508"},{"key":"S0219265921410310BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.107853"},{"key":"S0219265921410310BIB030","author":"Sara\u010devi\u0107 M. H.","year":"2020","journal-title":"IEEE Transactions on Reliability"},{"key":"S0219265921410310BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT52682.2021.9491644"},{"key":"S0219265921410310BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221429"},{"key":"S0219265921410310BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899376"},{"key":"S0219265921410310BIB034","author":"Sumit Singh Dhanda B. S.","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"S0219265921410310BIB035","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6092-8"},{"key":"S0219265921410310BIB036","volume-title":"2019 IEEE 13th International Conference on ASIC (ASICON)","author":"Zhao C.","year":"2020"},{"key":"S0219265921410310BIB037","volume-title":"2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)","author":"Shantha M. J. R.","year":"2019"},{"key":"S0219265921410310BIB038","first-page":"111","volume-title":"ICCBDC 2019: Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing","author":"Malarchelvi S. K.","year":"2019"},{"key":"S0219265921410310BIB041","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8821924"},{"key":"S0219265921410310BIB042","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923144"},{"key":"S0219265921410310BIB043","volume-title":"2019 International Conference of Computer and Applied Sciences (1st CAS2019)","author":"Kubba Z. M. J.","year":"2019"},{"key":"S0219265921410310BIB045","volume-title":"2019 4th International Conference on Electrical Information and Communication Technology (EICT)","author":"Ahmed S. F.","year":"2020"},{"key":"S0219265921410310BIB046","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885976"},{"key":"S0219265921410310BIB047","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN48934.2020.9071421"},{"key":"S0219265921410310BIB048","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES48766.2020.9138048"},{"key":"S0219265921410310BIB049","doi-asserted-by":"publisher","DOI":"10.3390\/sym11070853"},{"key":"S0219265921410310BIB050","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"S0219265921410310BIB051","first-page":"197","volume-title":"Proc. Symp. Secur. Privacy","author":"Chan H.","year":"2003"},{"key":"S0219265921410310BIB052","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_29"},{"key":"S0219265921410310BIB053","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134631"},{"key":"S0219265921410310BIB054","first-page":"1519","volume-title":"Proc. 28th USENIX Secur. Symp., USENIX Secur.","author":"Kumar S.","year":"2019"},{"key":"S0219265921410310BIB055","first-page":"847","volume-title":"Proc. IEEE Conf. Comput. Commun. (INFOCOM)","author":"Wang M.","year":"2019"},{"key":"S0219265921410310BIB056","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23076"},{"key":"S0219265921410310BIB057","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"S0219265921410310BIB058","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991126"},{"key":"S0219265921410310BIB059","first-page":"1133","volume-title":"Proc. 28th USENIX Secur. Symp., USENIX Secur.","author":"Zhou W.","year":"2019"},{"key":"S0219265921410310BIB060","first-page":"1","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. NDSS","author":"Celik Z. B.","year":"2019"},{"key":"S0219265921410310BIB061","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485944"},{"key":"S0219265921410310BIB062","first-page":"832","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Ding W.","year":"2018"},{"key":"S0219265921410310BIB063","first-page":"255","volume-title":"Proc. 27th USENIX Secur. Symp., USENIX Secur.","author":"He W.","year":"2018"},{"key":"S0219265921410310BIB064","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"S0219265921410310BIB065","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9209-5"},{"key":"S0219265921410310BIB066","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991127"},{"key":"S0219265921410310BIB067","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1488"},{"key":"S0219265921410310BIB068","first-page":"16","volume-title":"Proc. 32nd Annu. Conf. Comput. Secur. Appl. (ACSAC)","author":"Shi Y.","year":"2016"},{"key":"S0219265921410310BIB069","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4228"},{"key":"S0219265921410310BIB070","doi-asserted-by":"publisher","DOI":"10.1109\/IIKI.2016.3"},{"key":"S0219265921410310BIB072","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2706698"},{"key":"S0219265921410310BIB074","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2940742"},{"key":"S0219265921410310BIB076","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.006"}],"container-title":["Journal of Interconnection Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219265921410310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T04:19:48Z","timestamp":1665721188000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219265921410310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,28]]},"references-count":70,"journal-issue":{"issue":"Supp01","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1142\/S0219265921410310"],"URL":"https:\/\/doi.org\/10.1142\/s0219265921410310","relation":{},"ISSN":["0219-2659","1793-6713"],"issn-type":[{"value":"0219-2659","type":"print"},{"value":"1793-6713","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,28]]},"article-number":"2141031"}}