Secure Communication Protocol for Arduino-based IoT Using Lightweight Cryptography
How to cite (IJASEIT) :
Ahmad J, Zafar F, “Review of body area network technology & wireless medical monitoring.” International Journal of Information and Communication Technology. 2(2)., 2012.
Yadav G, Devi HMS., “Arduino based Security System - An Application of IOT”, International Journal of Engineering Trends and Technology (IJETT) - Special Issue. pp. 209-212. 2017.
Wahjuni S, Maarik A, Budiardi T. “The Fuzzy Inference System for Intelligent Water Quality Monitoring System to Optimize Eel Fish Farming”, Proceeding of The International Symposium on Electronics and Smart Devices. Bandung (ID), 2016.
Wahjuni S, Waladi A. “Komiot: Exploring Rest Protocol for IoT Server of The Automatic Control System for Production Land Irrigation.”, Proceedings of The 4th International Seminar on Sciences “Sciences for Green Development” pp.71-81., 2017
(2018) ESET We Live Security Website [Online]. Available: https://www.welivesecurity.com/2018/03/02/start-analyzing-security-iot-devices/
Loi F, Sivanathan A, Gharakheili HH, Radford A, Sivaraman, V. “Systematically evaluating security and privacy for consumer IoT devices”, In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (pp. 1-6), 2017.
Wu W, Zhang L. “LBlock: a lightweight block cipher”. International Conference on Applied Cryptography and Network Security (pp. 327-344). Berlin(DE): Springer, 2011.
Dinu D, Le Corre Y, Khovratovich D, Perrin L, GroíŸschí¤dl J, Biryukov A, “Triathlon of lightweight block ciphers for the internet of things”, Journal of Cryptographic Engineering. pp.1-20., 2015.
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L. “The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers”. In International Workshop on Lightweight Cryptography for Security and Privacy (pp. 3-20). Springer, Cham., 2014
Beaulieu R., Treatman-Clark S, Shors D, Weeks B, Smith J, Wingers L., “The SIMON and SPECK lightweight block ciphers”. 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6)., 2015.
Biryukov A, Dinu D, GroíŸschí¤dl J., “Correlation power analysis of lightweight block ciphers: from theory to practice”., In International Conference on Applied Cryptography and Network Security. (pp. 537-557), 2016.
Dinur, I. “Improved differential cryptanalysis of round-reduced speck”. In International Conference on Selected Areas in Cryptography (pp. 147-164). Springer, Cham. 2014
Dwivedi, A.D., Morawiecki, P. and Srivastava, G. “Differential cryptanalysis of round-reduced SPECK suitable for internet of things devices”. IEEE Access, 7, pp.16476-16486., 2019
Fu, K., Wang, M., Guo, Y., Sun, S. and Hu, L. “MILP-based automatic search algorithms for differential and linear trails for SPECK”. In International Conference on Fast Software Encryption (pp. 268-288). Springer, Berlin, Heidelberg. 2016, March.
Aumasson, J.P., Neves, S., Wilcox-O’Hearn, Z. and Winnerlein, C., “BLAKE2: simpler, smaller, fast as MD5”. In International Conference on Applied Cryptography and Network Security (pp. 119-135). Springer, Berlin, Heidelberg. 2013, June
Jain, A.K., Jones, R. and Joshi, P.. “Survey of Cryptographic Hashing Algorithms for Message Signing”. Int. J. Comput. Sci. Technol, 8, pp.18-22. , 2017
Luykx, A., Mennink, B. and Neves, S. “Security analysis of BLAKE2’s modes of operation.” IACR Transactions on Symmetric Cryptology, pp.158-176.`, 2016.
Bin-Rabiah A, Ramakrishnan KK, Liri E, Kar K. “A Lightweight Authentication and Key Exchange Protocol for IoT”. Workshop on Decentralized IoT Security and Standards (DISS). San Diego(US), 2018.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).