Section 2 Security Analysis

*Cryptography - Recent Advances and Future Developments*

[18] Domb, M.; Leshem, G. Secured Key Distribution by Concatenating Optical Communications and Inter-Device Hand-Held Video Transmission. MDPI and ACS Style Appl. Syst. Innov.

[19] Schirripa Spagnolo, G.; Cozzella, L.; Leccese, F. Underwater Optical Wireless Communications: Overview. Sensors

2020, 3, 11.

2020, 20, 2261

Collaborative Robotics. ICR 2019. Lecture Notes in Computer Science, vol 11659. Springer, Cham. https://doi. org/10.1007/978-3-030-26118-4\_26

[13] Denis P. Naughton, Robert Bedington, Simon Barraclough, Tanvirul Islam, Doug Griffin, Brenton Smith, Joe Kurtz, Andrey S. Alenin, Israel J. Vaughn, Arvind Ramana, Igor Dimitrijevic, Zong Sheng Tang, Christian Kurtsiefer, Alexander Ling, Russell Boyce, Design considerations for an optical link supporting intersatellite quantum key distribution, Optical Engineering, 58(1), 016106 (2019). https://doi.org/10.1117/1. OE.58.1.016106, 9 January 2019

[14] S. Arai, S. Mase, T. Yamizato, T. Yendo, T. Fujii, M. Tanimoto, and Y. Kimura, Feasible Study of Road-to Vehicle Communication System using LED Array and High-Speed Camera, 15th World Congress on Intelligent Transport Systems and ITS America's 2008 Annual Meeting, Nov. 2008,

[15] P. Luo, Z. Ghassemlooy, H. L. Minh, X. Tang, H-M. Tsai, Undersampled Phase Shift ON-OFF Keying for Camera Communication, WCSP 2014, Oct 2014,

[16] R. D. Roberts, Space-time forward

undersampled frequency shift ON-OFF

error correction for dimmable

keying camera communications (CamCom), Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp: 459-464,

[17] N. Liu, J. Cheng, J. F. Holzman, Undersampled differential phase shift on-off keying for optical camera communications with phase error detection, 13th International Wireless Communications and Mobile Computing Conference (IWCMC),

IEEE Xplore, July 2017

pp. 1-12.

pp. 1-6. IEEE

July 2013.

**58**

**Chapter 4**

**Abstract**

Mechanisms

cryptography, primitives, protocols

**1. Introduction**

**61**

Survey and Analysis of

*Adarsh Kumar and Deepak Kumar Sharma*

Lightweight Authentication

Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and is a major challenge. Classical or lightweight cryptography primitives and protocols are the solutions to enhance the security standards in such networks. Authentication protocols are one of the important security protocols required to be integrated before exchange of secured information. This work surveyed the recently developed authentication protocols. Further, classifications, security challenges, and attack analysis are explored. A comparative analysis of different types of authentication protocols explains their applications in resourceful and resource constraint Internet of Things (IoT). Authentication protocols are categorized into: symmetric, asymmetric, lightweight, ultra-lightweight and group protocols. Symmetric and asymmetric protocols are more suitable for resourceful devices whereas lightweight and ultra-lightweight protocols are designed for resource constraint devices. Security and cost analysis shows that asymmetric protocols provide higher security than any other protocol at a reasonable cost. However, lightweight authentication protocols are suitable for passive RFID devices but do not provide full security.

**Keywords:** authentication, authorization, cost analysis, cybersecurity, lightweight

Kevin Ashton in 2009 proposed an interconnected network of uniquely identifiable objects, devices, and different types of systems called IoT [1]. Some of the important features of IoT are self-configuration, sensing, ad-hoc networking, automatic identification, etc. [2]. In IoT, each object has a unique address and identification. Here, mostly RFID is preferred for assigning an address and unique object identification. The information, captured by IoT objects, is propagated through the internet to other objects. The information communicated captures the current events and responses. The revealed information further requires human interven-

tion to control the results [3]. Several objects are involved to form the

interconnected network: RFID devices, sensors, mobiles, back end storage, etc. Resourceful and resource constraints are the types of IoT devices. In resourceful devices, there are sufficient software and hardware resources. There are some hardware and software resource limitations in resource constraint devices. The role

#### **Chapter 4**
