ABSTRACT

The number of connected devices is expected to reach 50 billion, varying from sensors to industry-grade servers by 2020. These devices will communicate with each other using 5G technologies supporting high-capacity and longer ranges through massive machine-to-machine and human-to-machine communication. Security will still be a major concern in future networks. Conventional cryptographic algorithms may not be appropriate for constrained devices since they have limited CPU, power and memory. Lightweight cryptographic algorithms have been proposed to provide confidentiality, integrity and availability especially for constrained devices. In this chapter, we elaborate on constrained devices and security of machine-type communication, lightweight cryptographic algorithms, their features and related attack types.