The wireless sensor network (or WSN) is the most recent technology that is going to be the upcoming era of the internet that link various physical objects who connect with each other without required to the human interactions. Even so, security play’s considerable role in network in order to prevent the not data misuses, modification of data, authorized access, etc. The WSN communication could be secured by used a light-weight cryptography, that is the lighter kind of cryptography. About 50’s lightweight cryptography algorithms (basic encryption algorithms) were presented in the recent years with a focus on a certain application, in addition to many other methods have been made by the study for the NIST recent times. To be able to present an alternative view of the WSN security problems and the utilization of lightweight encryption to protect it, this study, a review was presented to review several existing light weight algorithms which could serve this area, along with make comparison among these algorithms relating to performances, implementation, and models of attacks and the protest to these attacks.

1.
Nižetić
,
S.
,
Šolić
,
P.
,
González-de
,
D.L.D.I.
and
Patrono
,
L.
,
2020
.
Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future
.
Journal of Cleaner Production
,
274
, p.
122877
.
2.
Bkheet
,
S.A.
and
Agbinya
,
J.I.
,
2021
.
A review of identity methods of internet of things (IOT
).
Advances in Internet of Things
,
11
(
4
), pp.
153
174
.
3.
McKay
,
K.
,
Bassham
,
L.
,
Sönmez Turan
,
M.
and
Mouha
,
N.
,
2016
.
Report on lightweight cryptography (No. NIST Internal or Interagency Report (NISTIR) 8114 (Draft
)).
National Institute of Standards and Technology.
4.
Al-Husainy
,
M.A.F.
,
Al-Shargabi
,
B.
and
Aljawarneh
,
S.
,
2021
.
Lightweight cryptography system for IoT devices using DNA
.
Computers & Electrical Engineering
,
95
, p.
107418
.
5.
Thabit
,
F.
,
Alhomdy
,
S.
,
Al-Ahdal
,
A.H.
and
Jagtap
,
S.
,
2021
.
A new lightweight cryptographic algorithm for enhancing data security in cloud computing
.
Global Transitions Proceedings
,
2
(
1
), pp.
91
99
.
6.
B.D.
Parameshachari
,
H.T.
Panduranga
, S. liberata Ullo Analysis and Computation of Encryption Technique to Enhance Security of Medical Images IOP Conference Series: Materials Science and Engineering,
925
,
IOP Publishing
(
2020
).
7.
W.
Du
,
Y.S.
Han
,
J.
Deng
, and
P.K.
Varshney
, “
A pairwise key pre-distribution scheme for wireless sensor networks
,”
2003
, doi: .
8.
G.S.
Pavithra
,
N.V. BabuEnergy efficient hierarchical clustering using HACOPSO in wireless sensor networks
Int. J. Innovat. Technol. Explor. Eng.
,
8
(
12
) (
2019
).
9.
M.
Ebrahim
and
C.W.
Chong
, “
Secure Force: a low-complexity cryptographic algorithm for Wireless Sensor Network (WSN
),”
2013
, doi: .
10.
Dener
,
Murat
. "
Security analysis in wireless sensor networks
."
International Journal of Distributed Sensor Networks 10
, no.
10
(
2014
):
303501
.
11.
Lee
,
Cheng-Chi
. "
Security and privacy in wireless sensor networks: Advances and challenges
."
Sensors
20
, no.
3
(
2020
):
744
.
12.
Huynh
,
Paul
. "
Design and Analysis of Lightweight Encryption Schemes
." PhD diss.,
Université de Lorraine
,
2020
.
13.
Okello
,
Wanican
Julian
,
Qingling
Liu
,
Faizan Ali
Siddiqui
, and
Chaozhu
Zhang
. "
A survey of the current state of lightweight cryptography for the Internet of things
." In
2017 International Conference on Computer, Information and Telecommunication Systems (CITS)
, pp.
292
296
.
IEEE
,
2017
.
14.
D.S. Abd
Elminaam
,
H.M.A.
Kader
,
M.M.
Hadhoud
Evaluating the performance of symmetric encryption algorithms
Int. J. Netw. Secur.
(
2010
)
15.
M.
Panda
, “
Performance analysis of encryption algorithms for security
,”
2017
, doi: .
16.
L.
Tawalbeh
,
N.S.
Darwazeh
,
R.S.
Al-Qassas
, and
F.
AlDosari
, “
A secure cloud computing model based on data classification
,”
2015
, doi: .
17.
R.
Arora
,
A.
Parashar
Secure user data in cloud computing using encryption algorithms
Int. J. Eng. Res. Appl.
(
2013
)
18.
S.S.
Khan
,
P.R.
Tuteja
Security in cloud computing using cryptographic algorithms
Int. J. Innov. Res. Comput. Commun. Eng.
(
2015
), .
19.
A.
Bogdanov
et al., “
PRESENT: an ultra-lightweight block cipher
,”
2007
, doi: .
20.
Federal Information Processing Standards National bureau of standards, federal information processing standards publication 197: announcing the advanced encryption standard (AES
)
Fed. Inf. Process. Stand. Publ.
(
2001
),
21.
Fadhil
,
Meryam
Saad
,
Alaa Kadhim
Farhan
, and
Mohammad Natiq
Fadhil
. "
A lightweight AES Algorithm Implementation for Secure IoT Environment
."
Iraqi Journal of Science
62
, no.
8
(
2021
):
2759
2770
.
22.
Engels
,
Daniel
,
Xinxin
Fan
,
Guang
Gong
,
Honggang
Hu
, and
Eric M.
Smith
. "
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
." In
International conference on financial cryptography and data security
, pp.
3
18
.
Springer
,
Berlin, Heidelberg
,
2010
.
23.
Engels
,
Daniel
,
Markku-Juhani O.
Saarinen
,
Peter
Schweitzer
, and
Eric M.
Smith
. "
The Hummingbird-2 lightweight authenticated encryption algorithm
." In
International workshop on radio frequency identification: Security and privacy issues
, pp.
19
31
.
Springer
,
Berlin, Heidelberg
,
2011
.
24.
Sleem
,
Lama
, and
Raphaël
Couturier
. "
Speck-R: An ultra-light-weight cryptographic scheme for Internet of Things
."
Multimedia Tools and Applications
80
, no.
11
(
2021
):
17067
17102
.
25.
Chintala
,
Radhika
Rani
,
Lakshmi Sri Ram
Janjanam
,
G.
SK
, and
S.
SP
. "
FPGA implementation of Katan block cipher for security in wireless sensor networks
."
International Journal of Emerging Trends in Engineering Research
7
, no.
11
(
2019
):
492
497
.
26.
Usman
,
Muhammad
,
Irfan
Ahmed
,
M. Imran
Aslam
,
Shujaat
Khan
, and
Usman Ali
Shah
. "
SIT: a lightweight encryption algorithm for secure internet of things
." arXiv preprint arXiv:1704.08688 (
2017
).
27.
Mishra
,
Zeesha
,
Shubham
Mishra
, and
Bibhudendra
Acharya
. "
High throughput novel architecture of sit cipher for iot application
." In
Nanoelectronics, Circuits and Communication Systems
, pp.
267
276
.
Springer
,
Singapore
,
2021
.
28.
Zhang
,
Wentao
,
Zhenzhen
Bao
,
Dongdai
Lin
,
Vincent
Rijmen
,
Bohan
Yang
, and
Ingrid
Verbauwhede
. "
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
."
Science China Information Sciences
58
, no.
12
(
2015
):
1
15
.
29.
Borghoff
,
Julia
,
Anne
Canteaut
,
Tim
Güneysu
,
Elif Bilge
Kavun
,
Miroslav
Knezevic
,
Lars R.
Knudsen
,
Gregor
Leander
et al. "
PRINCE–a low-latency block cipher for pervasive computing applications
." In
International conference on the theory and application of cryptology and information security
, pp.
208
225
.
Springer
,
Berlin, Heidelberg
,
2012
.
30.
Z.
Gong
,
S.
Nikova
, and
Y.W.
Law
, “
KLEIN: a new family of lightweight block ciphers
,”
2012
, doi:
31.
Klef
,
V.
,
2018
.
An efficient light weight cryptography algorithm scheme for WSN devices using chaotic map and GE
.
International Journal of Pure and Applied Mathematics
,
118
(
20
), pp.
861
875
.
32.
Thakor
,
Vishal
A.
,
Mohammad Abdur
Razzaque
, and
Muhammad R.A.
Khandaker
. "
Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
."
IEEE Access
9
(
2021
):
28177
28193
.
33.
Mileva
,
Aleksandra
,
Vesna
Dimitrova
,
Orhun
Kara
, and
Miodrag
J. Mihaljević.
"Catalog and Illustrative Examples of Lightweight Cryptographic Primitives." In
Security of Ubiquitous Computing Systems
, pp.
21
47
.
Springer
,
Cham
,
2021
.
34.
Lara-Nino
,
Carlos
Andres
,
Arturo
Diaz-Perez
, and
Miguel
Morales-Sandoval
. "
Elliptic curve lightweight cryptography: A survey
."
IEEE Access
6
(
2018
):
72514
72550
.
35.
Abd
Zaid
,
Mustafa
M.
, and
Soukaena
Hassan
. "
Lightweight RSA Algorithm Using Three Prime Numbers
."
International Journal of Engineering & Technology
7
, no.
4.36
(
2018
):
293
295
.
This content is only available via PDF.
You do not currently have access to this content.