addition, RoadRunneR's potential vulnerability in key attacks may stem from its reliance on simplistic
key scheduling. The speed of BRIGHT cypher can be improved, but only at the cost of greater
memory. To address this, the proposed BRIGHT cypher incorporates a speed-to-memory tradeoff into
its design.
incremental progress toward achieving the IoT's potential and protecting it from harm. The efficiency
of the proposed family of lightweight cyphers is measured in a number of ways. On 64-bit platforms,
the recommended family cyphers perform worse than any other benchmarked cypher save for Road
Runne R (64/80), but on 32-bit platforms, the suggested cyphers perform better than any similar LBC.
All of the suggested family cypher variations have the least flash memory use, with the exception of
the version with a 64-bit block size and 96-bit key size.
5. CONCLUSION:
To guarantee the authentication system is secure, we are developing a middleware that sits between
the user and the IoT environment and ensures that users are only connected to the IoT environment
after passing numerous authentications, even if the attacker is successful in retrieving the secret key.
As important values evolve over time, they become increasingly resistant to threats. On addition, the
user and the IoT device must have a safe way to interact with one another without the risk of a data
breach, and all of this information must be recorded in a distributed ledger utilising blockchain
technology for future verifications. The Internet of Things is an interdisciplinary field where cutting-
edge technology meets everyday people to boost both workplace satisfaction and output. With the
proliferation of IoT devices comes the need to manage, connect, and work together with a centralised
server/gateway, all of which are being met by an explosion of new technologies.
REFERENCES
1. Charnes, C., & Pieprzyk, J. (2018). An algebraic analysis of Trivium ciphers based on the
boolean satisfiability problem. In Proceedings of the 4th International Workshop on Boolean
Functions: Cryptography and Applications, pp. 173-184.
2. Hao, Y., Bai, D., & Li, L. (2015). A meet-in-the-middle attack on roundreduced mCrypton
using the differential enumeration technique. In International Conference on Network and
System Security, pp. 166-183.
3. Biham, E., Anderson, R., & Knudsen, L. (1998). Serpent: A new block cipher proposal. In
International workshop on fast software encryption, pp. 222-238.
4. Matsui, M., Moriai, S., Nakajima, J., & Tokita, T. (2000). Camellia: A 128-bit block cipher
suitable for multiple platforms—design andanalysis. In International Workshop on Selected
Areas in Cryptography, pp. 39-56.
5. Leander, G., Toz, D., Varici, K., & Verbauwhede, I. (2016). Spongent: The design space of
lightweight cryptographic hashing. IEEE Transactions on Computers, 62(10), 2041-2053.
6. Dutta, I. K., Ghosh, B., & Bayoumi, M. (2019). Lightweight Cryptography for Internet of
Insecure Things: A Survey. In 2019 IEEE 9th Annual Computing and Communication
Workshop and Conference (CCWC), pp. 0475-0481.
7. Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic search for the best trails in ARX:
application to block cipher speck. In International Conference on Fast Software Encryption,
Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), 9783(2008), 289- 310.
8. Hu, S., Philip, N. Y., & Sungoor, A. (2016). The potential of Internet of m-health Things “m-
IoT” for non-invasive glucose level sensing. In 2011 Annual International Conference of the
IEEE Engineering in Medicine and Biology Society, pp. 5264-5266. IEEE.
9. Al-Enezi, K. A., and Alenezi, A. Y. (2018). Improving the cost factor of dlbca lightweight block
cipher algorithm. Indonesian Journal of Electrical Engineering and Computer Science 10, 2,
786–791.
10. Mohammadi, M. and Ayyash, M. (2015). Internet of things: A survey on enabling
technologies, protocols, and applications. IEEE communications surveys & tutorials 17, 4,
2347–2376.
11. Weeks, B., and Wingers, L. (2015). The simon and speck lightweight block ciphers. In
Proceedings of the 52nd Annual Design Automation Conference. 1–6.