Next Article in Journal
A Novel Predictor for the Analysis and Prediction of Enhancers and Their Strength via Multi-View Features and Deep Forest
Next Article in Special Issue
IoT-Assisted Automatic Driver Drowsiness Detection through Facial Movement Analysis Using Deep Learning and a U-Net-Based Architecture
Previous Article in Journal
AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems
Previous Article in Special Issue
The PolitiFact-Oslo Corpus: A New Dataset for Fake News Analysis and Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Bibliometric Analysis of IoT Lightweight Cryptography

by
Zenith Dewamuni
,
Bharanidharan Shanmugam
*,†,
Sami Azam
and
Suresh Thennadil
Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin 0810, Australia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Information 2023, 14(12), 635; https://doi.org/10.3390/info14120635
Submission received: 13 September 2023 / Revised: 16 November 2023 / Accepted: 17 November 2023 / Published: 28 November 2023

Abstract

:
In the rapidly developing world of the Internet of Things (IoT), data security has become increasingly important since massive personal data are collected. IoT devices have resource constraints, which makes traditional cryptographic algorithms ineffective for securing IoT devices. To overcome resource limitations, lightweight cryptographic algorithms are needed. To identify research trends and patterns in IoT security, it is crucial to analyze existing works, keywords, authors, journals, and citations. We conducted a bibliometric analysis using performance mapping, science mapping, and enrichment techniques to collect the necessary information. Our analysis included 979 Scopus articles, 214 WOS articles, and 144 IEEE Xplore articles published during 2015–2023, and duplicates were removed. We analyzed and visualized the bibliometric data using R version 4.3.1, VOSviewer version 1.6.19, and the bibliometrix library. We discovered that India is the leading country for this type of research. Archarya and Bansod are the most relevant authors; lightweight cryptography and cryptography are the most relevant terms; and IEEE Access is the most significant journal. Research on lightweight cryptographic algorithms for IoT devices (Raspberry Pi) has been identified as an important area for future research.

1. Introduction

An Internet of Things (IoT) device is a concept with an on-and-off switch for connecting to the internet [1]. IoT is a concept in development in which sensors and smart devices are used to collect and process real-time information from the environment [2]. Over the past twenty years, IoT applications have shown significant growth [3]. IoT technology has many applications, including smart cities, healthcare, education, manufacturing, defense, energy, agriculture [4,5], smart parking systems, smart data acquisition systems, intelligent power grids, and smart data loggers [6].
In light of the increasing number of cyber criminals attacking IoT technology, the security of IoT devices has become increasingly crucial [7]. IoT provides devices with the opportunity to share data among themselves, and these data contain a great deal of confidential information that must be protected [8]. For IoT systems to be protected against unauthorized access, smart cities need high-level security [9]. Traffic light attacks or IoT-based electricity billing attacks can have a significant impact on the day-to-day lives of city residents and infrastructure. To prevent misuse of their data, these IoT systems need high-quality encryption systems [10].
As IoT devices are limited in power, processing, and memory [11], existing encryption algorithms cannot be used in IoT devices. The encryption algorithms used by IoT devices need to be power-efficient, as well as use low processing power and low memory, in order to operate securely [12]. Most IoT devices rely on battery power for power, so these algorithms should not interfere with the device’s operation and should not consume excessive amounts of energy for encryption [13]. The National Institute of Standards and Technology (NIST) has been significantly involved in the standardization of lightweight cryptographic algorithms and they called applications for the standardization process in 2019. A total of ten applications were advanced to the final round and the ASCON family algorithms were announced as the winners in March of 2023 [14]. Several lightweight weight algorithms exist [15], but they need to be tested and validated before being used.

1.1. Motivation and Research Questions

After reviewing recent research, it became clear that no bibliometric studies had been conducted on IoT lightweight cryptography. However, bibliometric reviews have been conducted for many areas related to IoT, including smart cities and IoT [16], bibliometric reviews of IoT since its foundation [17], smart homes and IoT [18], and IoT in healthcare [19]. Lightweight cryptography is a key topic of the IoT research area, and authors have identified a lack of bibliometric analysis of IoT lightweight cryptography and information and research gaps. It has provided motivation for authors to conduct bibliometric analyses of IoT lightweight cryptography. In this process, key bibliometric data are identified, facilitating future research on the topic. Therefore, this study was conducted to fill the gap in the literature. In addition to gaining insights into the field’s current state, the results of this research will identify possible future areas of research. To accomplish this goal, it is necessary to answer several basic questions. So, this explains the list of questions required in lightweight cryptography (LWC) to prepare the analysis.
  • Which countries are contributing the most to the development of IoT lightweight cryptography research?
  • Are there any authors who are conducting more research on this topic than the others?
  • Does this topic pertain to any trending topics? If so, what are they?
  • Which are the leading journals that publish research on this topic?
  • What type of co-relations exists between researchers in terms of their research?
  • What are the relationships between keywords used in articles?
We will conduct bibliometric analyses using the methods discussed in the Methods section to answer these questions. A significant gap in IoT LWC’s bibliometric information is expected to be filled by this research.

1.2. Raspberry Pi

Raspberry Pi is a small computer board introduced in 2012 that works like a regular PC and is cheap, powerful, hackable, and geared toward education [20]. Basically, it is a small, credit-card-sized computer that is affordable and able to perform a wide variety of tasks [21], and it can interface with many other devices [22]. Developers can program and develop various applications, such as video games and animations, using graphical programming languages such as Scratch. A programming language such as Python can also be used to develop applications [23]. Raspberry Pi boards provide a number of very good interfaces, including HDMI, Ethernet, USB 2.0, USB 3.0, WLAN, a CSI camera port, and a DSI display port. Boards such as Raspberry Pi 4B have a 64-bit quad-core Cortex A72 mCPU and 4 GB LDDR4 RAM, which gives evidence of the processing capabilities of Raspberry devices [24]. In comparison with other boards, such as Beagle boards, Netduino, and Arduino [22], these capabilities are higher.

1.3. Challenges of IoT Lightweight Cryptography Algorithms

Lightweight encryption plays a crucial role in Raspberry Pi data communication and storage [25]. To choose a suitable lightweight encryption algorithm for the Raspberry Pi system, factors such as energy consumption, RAM usage, and execution time should be taken into account [26]. Due to its market share, affordability, ease of use, and wide range of applications, Raspberry Pi has been chosen as the implementation platform for the newly developed lightweight cryptographic authentication in the future. In the IoT, low-resource devices can communicate, process data, and make decisions within the communication network. IoT devices face a number of challenges and issues, including power consumption, battery life, memory space, performance cost, and security in information Communication Technology (ICT) networks [27]. It will be a challenge for the industry to develop lightweight encryption that meets the above criteria. It will be necessary to fine-tune lightweight encryption algorithms in order to develop micro-size IoT devices that are secure. In comparison with traditional cryptographic algorithms, lightweight algorithms are less resource- and power-intensive [28]. Due to IoT devices’ resource limitations, traditional algorithms cannot be used to encrypt IoT data because of hardware damage, instability, and time limitations. Lightweight encryption, however, is more suitable for securing data on IoT devices due to its ability to endure limitations.

2. Review of Closely Related Works

A number of review articles have been published on IoT lightweight cryptography. Several of these articles provide an overview of IoT technology, IoT security, challenges associated with using conventional cryptography for IoT devices with limited resources, and an analysis of suitable LWC currently available. An overview of some of the most significant review articles relating directly to this topic can be found in this section.
The architecture and threats associated with IoT, devices at different layers, and securing IoT systems, as well as limitations of existing lightweight cryptography, have been discussed by Rana et al. [29]. They have addressed several questions, including what lightweight cryptography has developed to address security issues in IoT, how lightweight cryptography secures IoT devices, and the implications of the findings for future research in IoT. A series of IoT layers, as well as their vulnerability, were discussed in broad terms in the article. As the title suggests, it summarizes the capabilities of computer boards used in IoT devices as a whole. In addition, an excellent discussion was provided on the cipher methods and algorithms used in lightweight cryptography. The limitations of existing lightweight cryptography for IoT were discussed well. This article is comprehensive and provides relevant information for developing efficient encryption for further research.
Shahzad et al. [30] outlined some key topics related to attribute-based encryption, cipher text, and key management policy in IoT application security. Additionally, they discussed identity-based encryption, searchable encryption, and predicate encryption. A discussion of functional-based encryption is presented in the final section of the article. In addition, they provided excellent illustrations of some applications of encryptions in the form of graphical and tabular representations. Therefore, it provides a comprehensive discussion of all types of encryptions, as well as their limitations and applications. This article provides valuable insight into the process of developing a new cipher algorithm by a researcher.
Mrabet et al. [31] explored IoT technologies, IoT architecture, IoT physical devices and sensors, IoT communication and network protocols, IoT application layers, transport layers, and cloud services. Additionally, they discussed the lack of a standardized lightweight encryption standard for IoT devices and the use of machine learning to enhance the security of IoT devices. As a final point, they discussed the security of blockchain systems and cellular networks. The article discusses gaps in current IoT security technology, which provides an indication of areas that need further research.
Harbi et al. [32] provided an in-depth discussion of current trends in IoT security. At the outset, they discussed IoT devices, IoT architecture, IoT applications, and lessons learned from previous attacks. Threats to different layers of IoT security were also discussed, including those at the perception, network, and application layers. An in-depth discussion of emerging security solutions was conducted, including fog-based solutions, edge computing solutions, software-defined networks-enabled solutions, blockchain-based solutions, lightweight-cryptography-based solutions, homomorphic solutions, searchable solutions, and machine learning-based solutions. The discussion concluded with a discussion of security challenges and future directions. Despite providing a great deal of information regarding modern security solutions, this article does not go into detail regarding each topic.
Thakor et al. [33] focuses on the use of lightweight cryptographic algorithms on devices with limited resources. The article presented a brief overview of IoT, followed by an examination of traditional cryptography algorithms, challenges, and security requirements. After a brief overview of general characteristics, hardware and software performance, and a deeper structure-wise classification of lightweight cryptography, the discussion progressed to a more detailed analysis of LWC. There have been comprehensive analyses and comparisons of a few selected algorithms, and this is an excellent article for understanding existing LWC. The article then goes on to provide an in-depth analysis of the various algorithms, including their strengths and weaknesses, as well as their overall performance. This allows readers to better understand the pros and cons of each algorithm and decide which one is best suited for their specific needs.
Thabit et al. [34] have reviewed cryptography algorithms for enhancing the security of IoT devices. As a prelude to the discussion, a brief overview of IoT and its security was provided. In addition to cyber security and cipher methods, they explored the security trio. There was a detailed discussion of IoT architecture layers accompanied by graphical representations. They also discussed some of the applications of IoT cloud technology. Later in the article, they discuss IoT security challenges in terms of types of attacks, vulnerabilities, threats, and security requirements. They discussed the key challenges associated with using traditional cryptography in IoT devices, as well as lightweight cryptography in areas such as LWC usage, classification, and applications.
Singh et al. [27] described advanced lightweight algorithms for IoT devices. There was a discussion of the ciphers used and the hashes calculated, as well as the performance matrix of a low-performance device and a high-performance device. Asymmetric and symmetric LWCs have been discussed, as well as LWCs for cloud computing and IoT. The final section discusses the hybrid lightweight algorithm (HLA), which is a combination of asymmetric and symmetric algorithms. To illustrate the practical aspects of the subject, some graphical representations and mathematical representations were used. This article is unique among others due to the introduction of hybrid LWC encryption, and it provides good insight for researchers who wish to develop a new LWC. The article concludes by discussing security challenges and countermeasures.
Tao et al. [35] examined the use of hardware for secure data collection in IoT-based healthcare. After providing an overview of IoT technology, the article moved on to discuss security challenges and threat models. As they progress, they discuss how LWC technologies may be used to design secure data. Having discussed the technical aspects of LWC algorithms, the KATAN algorithm [36] was selected. They discussed hardware ciphers, secret cipher share technology, and cipher design using KATAN as a cipher algorithm. An understanding of how to implement the cipher algorithm can be gained by reading this article’s implementation and performance analysis.
In Table 1, some of the key points of the eight articles reviewed in this section are summarized. In light of these findings, IoT LWC plays an important role in ensuring the security of IoT devices. Several of the articles discussed the challenges associated with conventional cryptography in IoT devices with limited resources. There is no doubt that LWC algorithms are essential in order to encrypt data on IoT devices. It has been found that there has been no history of bibliometric analysis of the IoT lightweight cryptography problem. The purpose of this article is to examine recent trends in the field of IoT lightweight cryptography, including the nations and authors who were involved, the keywords that were most commonly used, and the collaborations that took place between researchers.
The above article’s contents are summarized as follows.
Table 1. Summary of existing work.
Table 1. Summary of existing work.
Related WorkSource JournalYearObjectives
[34]Elsevier Internet of Things2023Discuss importance of lightweight algorithms and compare cryptographic algorithms
[29]Future Generation Computer Systems2022Discuss state-of-the-art lightweight protocols, analyze contemporary ciphers, and evaluate recently developed block ciphers and stream ciphers.
[30]Sensors2022Review functional encryption application and cryptographic primitives
[32]IEEE Access2021Provide up-to-date vision to current IoT security.
[33]IEEE Access2021Compare existing algorithms in terms of some parameters and discuss demand and direction for new research in IoT lightweight cryptography.
[31]Sensors2020Present open research issues and future directions of IoT security.
[35]IEEE Internet of Things2018Provide detailed analysis comparing all cryptographic algorithms and their use in day-to-day life.
[27]Ambient intelligence and Humanized Computing2017Discuss how resource limitations of IoT affect its security and analyze some of the lightweight cipher algorithms and properties.

3. Materials and Methods

3.1. Bibliometric Analysis

Bibliographic analysis is a method that locates, compiles, and analyzes metadata in order to show how a field of knowledge has developed over time [37]. A bibliometric analysis is based on the bibliometric data of the data set that was used for the bibliometric analysis. For this analysis, we aim to conduct a performance and scientific mapping of bibliometric information related to the implementation of lightweight cryptography in IoT. Below is a diagram (Figure 1) that illustrates the basic protocol that is used in this research.

3.2. Data Collection

The Scopus database was chosen for article searches for the bibliometric analysis since it contains the largest repository and its publications follow peer-review standards [38], which are known for their scientific excellence [39,40]. Web of Science (WOS) has less coverage than Scopus, but its articles are closely related [41,42], which is the reason for selecting it. IEEE Xplore was selected due to its strong coverage of computer and electronic engineering subject areas, but most of the articles were already available with Scopus, which were removed by the data cleansing process.
The article search was run as per the methods mentioned in Appendix A and the identification process of records is shown in Figure 2. Table 2 summarizes the results of article searches.

3.3. Data Integration, Cleansing, and Validation

On Scopus and IEEE Xplore, data files were exported as CSV files. WOS generated an Excel file that was later converted to a CSV file, and Microsoft Excel was used to append these files. IEEE Xplore and WOS files were modified to match the Scopus data file. The data cleansing process involved sorting titles alphabetically and removing duplicates as per Appendix B. Using the title as a reference, duplicates were identified using Excel, and the number of articles ended up being 1014. For data integration, cleansing, and text superscript, the R package is also a good option [43], but Excel is much easier to use. Integrating appended files from different databases was challenging as column headers were used with different wording. Manually matching the columns and copying and pasting data is the most reliable and easy method as the accuracy of the data on the file that we use for analysis is critical. Removing duplicates is important and can be accomplished by following the duplicate-removing process in Appendix B. As an alternative, manual data cleansing can also be performed, but it is a time-consuming process. To validate the data, we manually checked the data to determine whether the articles were related to our analysis, but machine learning can be used for data validation if the data set is too large [44].

3.4. Data Analysis

For analyzing bibliometric data, there are many tools available. For a comprehensive analysis of bibliometric data, the R package is one of the most effective tools [45]. The biblioshiny component of the bibliometrix library was used to carry out the analysis. After choosing raw files as the database type and Scopus as the source file type, the data file was loaded into the data section of the biblioshiny data input section as per Appendix C. To obtain better and clearer results, a related analysis was conducted, and modifications were made, e.g., choosing the required visualization type yielded the required results as per Appendix C. The following types of visualizations were chosen: coupling of countries, co-occurrence of keywords, collaboration world map, most relevant words, word cloud, co-word map, word frequency over time, thematic map, trend topics, cluster by document coupling-word net, factorial analysis, most relevant sources, source production over time, most relevant authors, author production over time, and collaboration net. VOS viewer was also a good tool for analyzing bibliometric data [46], which was used to obtain some results in this analysis by using the steps described in Appendix C. Coupling of countries, bibliometric sources, and co-occurrence of the keyword were some of the results obtained using VOSviewer.

4. Results

Based on the methodology described above in Section 3, the data were analyzed, and the results are presented graphically and tabulated in this section.

4.1. Co-Author by Countries

As shown in Figure 3, India has the highest number of co-authors, followed by China and the United States. These three players play a significant role in terms of the number of co-authors. In addition to these, some other countries, such as France, Japan, the United Kingdom, Canada, Australia, Sweden, Luxembourg, and South Korea, are also part of the first-world developed country segment, which is highly technical and rich in technical resources. It is important to note that these countries are major players in the field of lightweight cryptography research. A number of countries in the Middle East, such as Saudi Arabia, Egypt, Iraq, Pakistan, Turkey, and Iran, have also shown a significant interest in this topic from a research perspective. In this analysis, bigger nodes represent a high volume of articles produced, and thicker lines represent the strength of the research relationships between these countries. There is no doubt that many of the countries in the world are showing good research interest in this topic, and there should be a good demand for this topic in the future. It is useful to analyze Figure 3 to determine which countries are more involved in LWC research. It would be helpful if future researchers understood which countries conduct more research in certain areas. Additionally, it serves as a knowledge database, as well as providing insight into collaborations. Additionally, entrepreneurs and technology investors will have a better understanding of which countries are leading the research, enabling them to make better business decisions.

4.2. Co-Occurrence of Key Words

Figure 4 shows that the Internet of Things, cryptography, and lightweight cryptography are all major keywords, which are also our selection keywords. Besides the main keywords, there are a number of other keywords that are closely related to them. Bigger nodes represent the high volume of appearance, and thicker lines represent higher relationships. There are four different clusters of keywords that have been identified, and they are each represented by a different color. A bunch of keywords related to IoT and cryptography are clustered together in the green cluster and linked to other keywords closely related to that research field. Lightweight cryptography appeared in the blue cluster with closely related topics such as cipher algorithms. Network security and security lead the red cluster. There is a greater relevance of these keywords to the IoT lightweight cryptography application. In the future, it will be a good source to help researchers find the most relevant articles in a particular field. When a few keywords are combined to form a combined search term in a database, it results in a very good search result. Based on the figure above, we can gain valuable insight into the search articles and provide good directions for future research.

4.3. Collaboration World Map

Figure 5 shows India is leading the way in terms of contributions to LWC research. In addition to China, the USA, the UK, and South Korea show a great deal of interest in this topic. There are strong ties between India and Saudi Arabia, China and the USA, India and Australia, the USA and Korea, and India and the USA. Research efforts in modern science are often conducted jointly, especially in emerging fields. A clear picture can be drawn of India, the USA, China, the UK, and South Korea collaborating on this IoT LWC research. About one-third of the research is conducted in India and China. These countries will become the main hub for IoT LWC research. Moreover, the USA has a strong research interest in this area with a good level of collaboration with China and India. In LWC, these countries are at the top of the list for researchers who wish to collaborate with other countries. Table 3 shows the percentage of contribution by top 5 countries in terms of collaboration.

4.4. Collaboration Network

Figure 6 shows how the collaboration network can identify contribution clusters up to ten. The contribution of Archarya to the IoT LWC research area plays a significant role in this research by representing his name in larger text. Table 4 shows the cluster number against the color of the cluster for easy reference. There is no doubt that he has a high page ranking, as is reflected in the larger text that appears next to his name. In the segment represented by the largest node, he has a high degree of closeness with his colleagues. This researcher collaborates mainly with five other researchers in that cluster. Bansod is also a significant player who appears in Cluster 7. Moreover, he has a higher page ranking and shows a stronger connection with other researchers, as evidenced by a larger number of nodes and larger text. He is part of a research cluster that includes four other researchers. Other clusters do not have any leading names, but Cluster 3, which is in light green, has nine researchers around.

4.5. Most Relevant Words

Figure 7 shows how often each keyword appeared in the data set and the number of times each keyword was used. In the data set, the keyword lightweight cryptography appeared 305 times. Internet of Things and IoT appeared 509 times as a combined result. There were 119 instances of cryptography appearing in the most relevant word search and 151 instances of security. Based on our search of our database around these three topics, we can conclude that our data set is more relevant. Researchers using the IoT LWC can use this analysis to determine whether their literature data set is relevant to the topic. Based on the analyzed data set, it is clear that IoT LWCs are closely related. Another word that appeared in our data set was lightweight, followed by authentication, encryption, and FPGA. This means that these keywords are some of the most related to IoT cryptography. As a result, the IoT keyword appears multiple times for different letter combinations. The purpose of this tool is to help researchers design research and research papers related to the IoT LWC field and to help them write them.

4.6. Word Cloud

In Figure 8, Internet of Things, lightweight cryptography, cryptography, and security are the main texts that appear [47]. Among the analyzed data set, these three keywords are the most prevalent, representing a significant number of articles. The small text also contained other keywords like lightweight, encryption, and authentication, which means that they are closely related to the main keywords [48]. These are partly related topics that could be included in the IoT LWC, and researchers should consider this to get a better idea of how IoT LWC fits into the existing work. In terms of IoT LWC, it is a good tool for setting up research directions and showing the numeric proportion of keywords appearing in articles through the tabular representation of the word cloud. Table 5 shows the number of appearances of the top ten keywords.

4.7. Co-Word Net

Figure 9 shows that three keywords dominate: Internet of Things (IoT), lightweight cryptography, and security. These are the main topic areas in our search that are directly related to the main keywords we are searching for, and this analysis gives an idea of the co-occurrence of keywords in the data set [49]. The topic is closely related to several other keywords, including encryption and decryption, advanced encryption standards, block ciphers, and hardware security, which are closely related to the main topic, and it gives an idea of how different concepts relate to each other [50]. Bigger nodes represent a higher number of appearances, and thicker lines represent the strong relationship between keywords. There are two clusters that can be identified, but one cluster is dominant, which is highlighted in red. There is a strong correlation between the IoT LWC subject area and that cluster. It is a useful tool for researchers who want to move beyond the major research areas of IoT LWC to develop new research themes or expand existing ones. In Table 6, you can see a table with a list of the top 10 players in the red cluster in a tabular format.

4.8. Word Frequency over the Time

Based on the data in Figure 10, it can be seen that keywords related to IoT cryptography and LWC have demonstrated good cumulative occurrences over time. There is no doubt that IoT LWC is a growing research field, which can act as a signal for a new researcher to focus their attention on that area for the sake of a successful research project. In addition, there is another significant piece of information on the graph that indicates that all of these topics started climbing in the graph around 2016, which is an indication that these topics emerged from that time period. In other words, IoT LWC is a relatively new area of research that offers many opportunities for new researchers to improve their skills and understanding of the subject. In Table 7, the performance of the top five keywords over the last 5 years is presented in a tabular format.

4.9. Thematic Map

Figure 11 shows that cryptography, the Internet of Things, and lightweight cryptography are categorized as basic themes. In terms of basic themes, the development degree is low, but the relevance degree is high. Moving toward the right indicates an upward trend, while moving upward indicates a high degree of trend, and moving toward the left indicates a downward trend [51]. The data set allows us to identify that LWC, IoT, and cryptography are rising topics, but the amount of trending is still low for these topics. There is no doubt that these topics are going to be a trend in the future. Some niche themes can be identified in this analysis, such as the avalanche effect and attribute-based encryption, which are sub-topics of cryptography. Based on the positions found in the graph, it is apparent that those themes are showing a good level of rise and trend over time. There are a number of motor themes that can be identified in the graph, which are still in their rising and trending stages, such as Raspberry Pi, lightweight block cipher, present, and Simon. Post-quantum cryptography is in the emerging themes category, which is in the middle and will be a trending topic in the future.

4.10. Trend Topics

In Figure 12, a great deal of attention is paid to areas such as IoT, lightweight, security, encryption internet, and algorithms. There are also some emerging topics that can be identified, including RFID, IoT healthcare, elliptic curves, and IoMT. As The keywords usually given to the articles are connected to the publication content, which generates a topical aspect of the field [52], there is no doubt that this analysis is very useful in understanding the design of the research and where the future focus of the research will be in the research area of IoT LWC as well. A large number of articles dealt with topics such as the Internet of Things, lightweight cryptography, encryption, security, and the internet, which resulted in larger nodes that represented those topics.

4.11. Factorial Analysis

In Figure 13, it can be identified only one cluster, which consists of a number of research topics, in our analysis. This analysis helps us to gain a better understanding of the mature cluster in the nomogram when it comes to the Internet of Things LWC. In this study, only one cluster can be identified as a result of the data analysis, and a number of topics located in the fourth quadrant of the table, such as cryptography algorithms, cryptography, lightweight encryption, and hardware implementations, are better suited for further development. There is no doubt that cryptography and cryptographic algorithms are in that category and it gives a researcher confidence to conduct research in the area of IoT LWC research.

4.12. Bibliometric Source

Figure 14 illustrates that IEEE Access has the highest number of journal articles published in the subject area. There are nodes representing journals, and the bigger the node, the more publications there have been in that journal. IEEE Internet of Things, Lecture Notes in Computer Science, and Lecture Notes in Electrical Engineering are some other top journals. IEEE Access and IEEE Internet of Things have a good relationship, as indicated by the lines connecting nodes in the graph. There is a good relationship between the lecture notes for computer science and those for electrical engineering. Interestingly, there appears to be a correlation between the thickness of the lines and the strength of the connections between the journals in terms of quality. As a result of this analysis, a researcher will be able to find articles more efficiently and make reference sources more reliable as a result of the analysis. In addition, researchers can also use this method in order to determine which journals to select for publication in particular areas of research.

4.13. Most Relevant Sources

Figure 15 shows that IEEE Access is the leading journal in the IoT lightweight cryptography subject area. IEEE Access is a free-accessible journal, which may explain its position at the top. Lecture Notes in Computer Science and Lecture Notes in Electrical Engineering are the second and fourth leading journals published by Springer Nature. IEEE Internet of Things is the third leading journal in the IoT LWC area. But Sensors appeared two times as Sensors, and Sensors (Switzerland) is the same MDPI journal, which appeared 31 times together, comes to number four in this analysis. This analysis provides a number of relevant articles that are easy to understand and compare. Analyzing these data allows a researcher to identify relevant articles and references, as well as suitable journals for publishing papers. In terms of publication of articles and searching for references, this diagram will help to get an idea.

4.14. Source Production over Time

In Figure 16, it can be seen that IEEE Access is the most prolific journal in terms of source production over time, and it clearly shows healthy growth in recent years. Lecture Notes in Computer Science, Lecture Notes in Electronic Engineering, and IEEE Internet of Things are some of the other leading journals that have shown similar kinds of growth over the years. However, compared to other journals, the Advanced in Intelligence and Systems journal stopped being active after 2019 compared to other journals. Lecture Notes in Computer Science also shows a plat line during the last couple of years means that the journal is also getting less active. IEEE Access, Lecture Notes in Electronic Engineering, IEEE Internet of Things, and IEEE Lecture Notes in Electronic Engineering are the most suitable journals in which to publish or search for references. Table 8 shows the top 5 journals’ performances during 2018–2023.

4.15. Most Relevant Author/Author Production over Time

Figure 17 clearly shows Archarya and Bangsod are two of the leading researchers in LWC, and any researcher who is interested in research in the IoT LWC field can look at the above list of names and select some articles from it that they may find useful in their research. Table 9 is a tabular representation of the top 10 authors based on their relevance in terms of their most relevant publications. For an accurate assessment of the quality of the authors, it would be better to combine the findings of this analysis with a number of citations from Figure 18 in order to obtain a good idea of their research. As shown in Figure 18, Archarya started a bit later in this field compared to other researchers, but he has consistently contributed to the research field of IoT LWC and is currently active in this field. Mizra, Khan, and Singh are some other similar kinds of researchers. Bansod is an early starter in the IoT LWC research field but has not been active since 2019. Li is another consistent researcher in the IoT LWC research area. The con of the above analysis is that it does not provide any indication of the quality of the articles that have been produced as a result. It is highly recommended to use this analysis in conjunction with a matrix of quality indicators, such as the number of citations that are indicative of the quality of the publication, as it highly depends on the number of publications.

4.16. Publication and Citation

Figure 19 illustrates the period that runs from 1975 to 2022. Some of the old articles were also referred to in this data set in order to provide references. In the period from 1990 to 2020, the period of the information age is characterized by the highest number of peaks. If a researcher is looking for articles to use as references, they can narrow down their search to articles published during this period. The number of cited references is represented in blackline and deviation from the 5-year median is represented in redline.

5. Findings

Our goal is to understand the role of lightweight cryptography in IoT devices. In the current analysis, IoT, cryptography, and lightweight cryptography have shown a significant level of appearance. This shows the importance of LWC in IoT technology. Increasing the term frequency, keyword appearance, and co-occurrence of keywords are some of the indications that research in LWC is an emerging field of research. It is an ideal opportunity for a researcher to conduct research in this subject area.
A closer look at the collaboration world map and co-authorship by country show that India leads the research in IoT lightweight cryptography. Some of the leading researchers are based in India and have enthusiasm for technological studies with students. Some institutes’ high interest in IoT lightweight cryptography could be the reason behind its success. For researchers and investors seeking technological collaboration, India can be a good choice. In addition to China, the US, and the UK, South Korea, some Middle Eastern countries have shown interest in IoT lightweight cryptography. The research area of IoT LWC is receiving significant attention from all continents, except Africa and Eastern Europe. In that sense, it is a good sign that a new researcher understands the importance of this field.
A keyword analysis shows that IoT, cryptography, and lightweight cryptography are some of the most common words. That can be seen in word clouds and co-word networks. The same number of articles discussed these keywords, which indicates that they were discussed extensively. Over time, lightweight cryptography has shown significant increases in word frequency and trend topics. As a result, lightweight cryptography will become an important research area in the future.
Using author-related analyses such as the most relevant authors and authors’ productions over time, we can identify who is the leading researcher around LWC for IoT. Authors such as Archarya and Bansod have conducted several research studies in this area of study. It is evident that the author is continuing to work on their work over the course of time. Archarya is a researcher from the National Institute of Raipur and is working with a network of other researchers. As per the Scopus database, he has produced 118 articles, and his articles have been cited over 1100 times by 722 documents, making significant contributions to the industry. He appeared in our search 25 times, and lightweight cryptography is one of his major research fields. Bansod has also produced 20 articles with over 500 citations, and his major research fields are embedded systems, low-power cryptography, and lightweight cryptography.
There is no doubt that IEEE Access is the leading journal based on an analysis of journals. As per its cover page, it is a multidisciplinary, open-access, and rapid-review journal, which could be the reason behind its success of publishing in the IoT lightweight cryptography subject area. It has an impact factor of 4.82, and it is in the Q1 zone in the SCimago journal ranking with a score of 0.926. The lecture notes on electrical engineering and the lecture notes on computer science and IEEE Internet of Things and Sensors are also some of the strongest journals in the IoT LWC. This means that these are good journals to find information on IoT LWC for researchers who are just starting out. It is clear from these analyses that researchers will be able to identify which journals are suitable for publishing their articles in the IoT LWC based on these analyses.
These bibliometric analysis results indicate that there are several areas of future research to explore. With topics such as IoT security and IoT applications gaining prominence in modern times, IoT research is a major trend now, and many researchers are now focusing on IoT technology and IoT applications. However, niche areas of research such as IoT lightweight cryptography, which is a hot topic now, are the future trends, as most researchers are focusing on this area in depth. Researchers can continue to narrow down their research topic to areas such as cipher algorithms, block ciphers, and so on if they wish to go further and be more specific with their research.
These results provide a sound understanding of the importance of IoT cryptography as a solid foundation for IoT security. It provides a very comprehensive foundation for a decision-making tool for anyone interested in IoT lightweight cryptography.

5.1. Answers for Research Questions

Some of the research questions were set up at the beginning of the article with the intention to answer them based on results obtained from the analysis.
  • Which countries are contributing the most to the development of IoT lightweight cryptography research?
Collaboration world map and co-author by country are key analyses to answer this question. Both analyses show that India is the leading collaborator of IoT LWC researchers. China is the second largest country, and the USA, the UK, and South Korea are some other contributors to the IoT LWC research field. There are many middle-level players such as Saudi Arabia, Pakistan, France, Australia, Malaysia, Turkey, and Iran identified by the analysis.
  • Are there any authors who are conducting more research on this topic than the others?
It is possible to answer this question by analyzing several factors, including collaboration networks, most relevant authors, and author production over time. This is in accordance with the analysis mentioned above. Archarya, Bangsod, Li, and Mizra are some of the key contributors to the IoT LWC research field. Archarya. B played a significant role in this research field as he was identified as the key researcher by a number of analysis tools in this research.
  • Does this topic pertain to any trending topics? If so, what are they?
According to the analysis of trend topics, thematic map, and factorial analysis, IoT and IoT lightweight cryptography can be identified as some of the trending research topics in the field of IoT. Raspberry Pi is another trending topic identified by the thematic map in this research.
  • Which are the leading journals that publish research on this topic?
Although IEEE Access is the leading journal for IoT LWC, Lecture Notes on Computer Science and Lecture Notes on Electronics Engineering are also significant contributors to the field. Another important journal on this topic is the IEEE Internet of Things Journal. MDPI’s Sensors is also another important journal that was identified by the most relevant journal analysis as the number four contributor.
  • What type of co-relations exist between researchers in terms of their research?
According to the analysis of the data, there are certain clusters of co-relations that can be identified, such as the collaboration network. A total of 10 clusters have been identified, and 2 of them are leading research clusters led by Archarya and Bansod and another cluster with 9 researchers but no leader. It has also been reported that there are a few small clusters of members with two to six members as well.
  • What are the relationships between keywords used in articles?
Internet of Things, lightweight cryptography, security, cryptography, encryption, and authentication are some of the leading keywords used by authors as indicated by the word cloud, the co-word net, and the most relevant words based on word frequency over time. It is clear from the list of keywords that they have a strong relationship with each other.

5.2. Limitations of the Study

This study analyzed the bibliometric data for LWC successfully, but there are some limitations that can be improved in future studies. Our first limitation was that we chose only three databases, but other databases containing more articles are available as well. Despite this limitation, we have selected the largest and most relevant databases to mitigate it. Additionally, only English-language articles were selected, even though other languages might have been published as well. Most articles are published in English, which reduces this limitation significantly. By selecting articles from 2015 to 2023, we may have excluded articles published prior to that period. Due to the relatively new nature of the subject area, we wanted to limit the study to the latest and most relevant articles.

6. Conclusions and Future Research Directions

In conclusion, IoT lightweight cryptography presents many opportunities for researchers in an emerging field and is a rapidly growing research area. In addition to device-based encryption, project-based encryption, and equipment-based encryption research could also be expanded to various types of lightweight encryption applications. A device-based analysis is of particular importance since many established devices, such as Raspberry Pi, Arduino, and Beegle, require lightweight encryption. As we mentioned in the Introduction, Raspberry Pi is a board type that has many advantages and is gaining a large share of the market rapidly [53]. Currently, Raspberry Pi does not offer such lightweight encryption. Considering the unique limitations and rapid development of Raspberry Pi devices, it is crucial to have tailor-made encryption. Developing lightweight algorithms specifically for Raspberry Pi is a positive contribution to the technology. In the future, we plan to develop a lightweight encryption algorithm for Raspberry Pi to be compatible with its specifications. Algorithms such as KATAN [36], Blowfish [54], the Data Encryption Standard (DES) [55], and the Advanced Encryption Standard (AES) [56] can also be considered as base algorithms for developing a new lightweight encryption algorithm. Researchers will be able to come up with this kind of research based on the above analysis, which will contribute enormously to the IoT industry in the future.

Author Contributions

All authors contributed to the study conception and design. Material preparation, data collection, and analysis were performed by Z.D. and B.S. The first draft of the manuscript was written by Z.D. and B.S. All authors commented on previous versions of the manuscript. S.A. reviewed the article and S.T. contributed at the supervisory level to the article. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Source files that were used to analyze data are available on the Figshare repository: https://doi.org/10.6084/m9.figshare.24434035.v1 (accessed on 15 October 2023).

Conflicts of Interest

The Authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
LWCLightweight cryptography
RAResearch article
WOSWeb of Science
OTOver time
BRBibliometric review
SBCSingle-board computers
HDMIHigh-definition multimedia interface.
CSICamera serial interface
DSIDisplay serial interface
WLANWireless local area network
IEEEInstitute of Electronics and Electrical Engineers
NISTNational Institute of Standards and Technology.
HLAHybrid lightweight algorithm
IoT LWCInternet of Things Lightweight Cryptography
FPGAField-programmable gate array

Appendix A. Article Search

Scopus article search method
  • Load the Scopus database to the browser.
  • There are many criteria available for “search within”, but in this case, we selected “keywords” to filter the most relevant article set as per Figure A1 and filter by time range as per Figure A2 limits the article search to the most recent article set.
  • Proceed to search for other word combinations.
Figure A1. Scopus article search interface.
Figure A1. Scopus article search interface.
Information 14 00635 g0a1
Figure A2. Scopus: time period filter.
Figure A2. Scopus: time period filter.
Information 14 00635 g0a2
4.
Conduct an article search for other word combinations.
Follow the same procedure for IEEE Xplore as per Figure A4 and for WOS as per Figure A3.
The following figures provide the idea of search interfaces and keyword entry methods.
Figure A3. WOS article search interface.
Figure A3. WOS article search interface.
Information 14 00635 g0a3
Figure A4. IEEE Xplore article search interface.
Figure A4. IEEE Xplore article search interface.
Information 14 00635 g0a4

Appendix B. Data Integration and Cleansing

Integrate Files belongs to the Scopus Database.
  • Open Microsoft Excel and open a new Workbook.
    Home > Select Blank Workbook.
  • Load files into the Workbook.
    Data > From CSV/TEXT > Import Data Window > Select File > Load > Load/SAVE
    (Import all the files belonging to Scopus using the same method.)
  • Files can be appended using the below method.
    Query > Append > Select 3 or more Table to Append > Select files from the list > OK
    Data Cleansing for Scopus Database.
  • Open the previously appended file on the screen.
  • Follow the below procedure.
    Table Design > Remove Duplicate > Select topic as criteria.
IEEE database files are also prepared as the above method, but WOS files are in .xlsx format. The same procedure for loading files could be run but extra selection is needed as it converts the data set to table format. The other two appended files were copied and pasted to the suitable columns to prepare the final file for analysis. Data cleansing was performed as per the above data cleansing method.
Figure A5. Load data from file.
Figure A5. Load data from file.
Information 14 00635 g0a5
Figure A6. Import data.
Figure A6. Import data.
Information 14 00635 g0a6
Figure A7. Load data.
Figure A7. Load data.
Information 14 00635 g0a7
Figure A8. Append data.
Figure A8. Append data.
Information 14 00635 g0a8
Figure A9. Remove duplicates.
Figure A9. Remove duplicates.
Information 14 00635 g0a9
The process in Figure A9 will help to remove duplicates but sort titles according to alphabetical order and checking the data set manually will help to validate whether all duplicates were removed or not.

Appendix C. Data Analysis

Data Analysis Using R Package.
R Package can be downloaded from https://cran.r-project.org (accessed on 15 October 2023)
  • Download and install R Package.
  • Open R Consol, and install the bibliometrix library in the following way.
    Use this command in Command Prompt: install.packages(“bibliometrix”)
    Follow further instructions to install.
  • Open biblioshiny
    Use these commands on the prompt after installation:
    >Library (bibliometrix);
    >biblioshiny ().
  • It should open the interface as per Figure A11
  • Loading the dataset set in CSV format is another important step. Selected options as per Figure A12
  • Run required reports as per the example in the figure.
    Select the Options button, adjust the option, and press the Start button to provide results.
  • Download results.
  • Repeat the procedure for other required analysis options.
Figure A10. Load data from file.
Figure A10. Load data from file.
Information 14 00635 g0a10
Figure A11. Analysis options.
Figure A11. Analysis options.
Information 14 00635 g0a11
Figure A12. Example of analysis.
Figure A12. Example of analysis.
Information 14 00635 g0a12
VOS Viewer Analysis.
  • Install VOSviewer from this URL: https://www.vosviewer.com/download (accessed on 15 October 2023)
  • Open VOS Viewer, and follow the below steps to create analysis output.
    Select Create > Create a Map based on Bibliometric Data > Read Data from bibliometric data files > Select Scopus > Load the file > Select required analysis combination > Select Finish.
    The analysis could be obtained as network, overlay, or density visualization.
    These results could be obtained as screenshots or direct downloads.
    The following screenshots provide a better understanding of the process.
Figure A13. Starting to create analysis.
Figure A13. Starting to create analysis.
Information 14 00635 g0a13
Figure A14. Analysis options.
Figure A14. Analysis options.
Information 14 00635 g0a14
Figure A15. File selection for analysis.
Figure A15. File selection for analysis.
Information 14 00635 g0a15

References

  1. Tiwary, A.; Mahato, M.; Chidar, A.; Chandrol, M.K.; Shrivastava, M.; Tripathi, M. Internet of Things (IoT): Research, Architectures, and Applications. Int. J. Future Rev. Comput. Sci. Commun. Eng. 2018, 4, 23–27. [Google Scholar]
  2. Zahmatkesh, H.; Al-Turjman, F. Fog Computing for Sustainable Smart Cities in the IoT Era: Caching Techniques and Enabling Technologies-An Overview. Sustain. Cities Soc. 2020, 59, 102139. [Google Scholar] [CrossRef]
  3. Avval, D.B.; Heris, P.O.; Navimipour, N.J.; Mohammadi, B.; Yalcin, S. A New QoS-Aware Method for Production Scheduling in the Industrial Internet of Things Using Elephant Herding Optimization Algorithm. Clust. Comput. 2022, 26, 1–16. [Google Scholar] [CrossRef]
  4. Sethy, P.K.; Behera, S.K.; Kannan, N.; Narayanan, S.; Pandey, C. Smart Paddy Field Monitoring System Using Deep Learning and IoT. Concurr. Eng. 2021, 29, 16–24. [Google Scholar] [CrossRef]
  5. Xie, B.; Li, S.; Li, M.; Liu, C.H.; Huang, G.; Wang, G. Sepico: Semantic-Guided Pixel Contrast for Domain Adaptive Semantic Segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 9004–9021. [Google Scholar] [CrossRef]
  6. Minoli, D.; Occhiogrosso, B. Practical Aspects for the Integration of 5G Networks and IoT Applications in Smart Cities Environments. Wirel. Commun. Mobile Comput. 2019, 2019, 5710834. [Google Scholar] [CrossRef]
  7. Kagita, M.K.; Thilakarathne, N.; Gadekallu, T.R.; Maddikunta, P.K.R.; Singh, S. A Review on Cyber Crimes on the Internet of Things. In Deep Learning for Security and Privacy Preservation in IoT; Makkar, A., Kumar, N., Eds.; Signals and Communication Technology; Springer: Singapore, 2021; Chapter 4; pp. 65–80. [Google Scholar]
  8. Tripathi, A.; Sindhwani, N.; Anand, R.; Dahiya, A. Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications. In IoT Based Smart Applications; Springer: Cham, Switzerland, 2022; pp. 199–217. [Google Scholar]
  9. Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety, and Ethics. In Digital Twin Technologies and Smart Cities. Internet of Things; Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H., Eds.; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  10. Mustafa, G.; Ashraf, R.; Mirza, M.A.; Jamil, A.; Muhammad. A Review of Data Security and Cryptographic Techniques in IoT-Based Devices. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, 26–27 June 2018; pp. 1–9. [Google Scholar]
  11. Noura, H.; Chehab, A.; Sleem, L.; Noura, M.; Couturier, R.; Mansour, M.M. One Round Cipher Algorithm for Multimedia IoT Devices. Multimed. Tools Appl. 2018, 77, 18383–18413. [Google Scholar] [CrossRef]
  12. Pawar, A.B.; Ghumbre, S. A Survey on IoT Applications, Security Challenges, and Countermeasures. In Proceedings of the 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 19–21 December 2016; pp. 294–299. [Google Scholar]
  13. Surendran, S.; Nassef, A.; Beheshti, B.D. A Survey of Cryptographic Algorithms for IoT Devices. In Proceedings of the 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, 4 May 2018; pp. 1–8. [Google Scholar]
  14. Turan, M.S.; McKay, K.; Chang, D.; Bassham, L.E.; Kang, J.; Waller, N.D.; Kelsey, J.M.; Hong, D. Status Report on the Final Round of the NIST Lightweight Cryptography. 2023. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8454.pdf (accessed on 21 November 2023).
  15. Zhang, Z.K.; Cho, M.C.Y.; Wang, C.W.; Hsu, C.W.; Chen, C.K.; Shieh, S. IoT Security: Ongoing Challenges and Research Opportunities. In Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan, 17–19 November 2014; pp. 230–234. [Google Scholar]
  16. Rejeb, A.; Rejeb, K.; Simske, S.; Treiblmaier, H.; Zailani, S. The Big Picture on the Internet of Things and the Smart City: A Review of What We Know and What We Need to Know. Internet Things 2022, 19, 100565. [Google Scholar] [CrossRef]
  17. Sadeghi-Niaraki, A. Internet of Things (IoT) Review of Review: Bibliometric Overview Since Its Foundation. Future Gener. Comput. Syst. 2023, 1, 1000000. [Google Scholar] [CrossRef]
  18. Choi, W.; Kim, J.; Lee, S.; Park, E. Smart home and internet of things: A bibliometric study. J. Clean. Prod. 2021, 301, 126908. [Google Scholar] [CrossRef]
  19. Rejeb, A.; Rejeb, K.; Treiblmaier, H.; Appolloni, A.; Alghamdi, S.; Alhasawi, Y.; Iranmanesh, M. The Internet of Things (IoT) in Healthcare: Taking Stock and Moving Forward. Internet Things 2023, 1, 100721. [Google Scholar] [CrossRef]
  20. Brock, J.D.; Bruce, R.F.; Cameron, M.E. Changing the World with a Raspberry Pi. J. Comput. Sci. Coll. 2013, 29, 151–153. [Google Scholar]
  21. Karthikeyan, S.; Aakash, R.; Cruz, M.V.; Chen, L.; Ajay, V.J.L.; Rohith, V.S. A Systematic Analysis on Raspberry Pi Prototyping: Uses, Challenges, Benefits, and Drawbacks. IEEE Internet Things J. 2023, in press. [Google Scholar] [CrossRef]
  22. Maksimović, M.; Vujović, V.; Davidović, N.; Milošević, V.; Perišić, B. Raspberry Pi as Internet of Things Hardware: Performances and Constraints. Des. Issues 2014, 3, 1–6. [Google Scholar]
  23. Zhao, C.W.; Jegatheesan, J.; Loon, S.C. Exploring IoT Application Using Raspberry Pi. Int. J. Comput. Netw. Appl. 2015, 2, 27–34. [Google Scholar]
  24. Pham, Q.Q.; Ta, Q.B.; Park, J.H.; Kim, J.T. Raspberry Pi Platform Wireless Sensor Node for Low-Frequency Impedance Responses of PZT Interface. Sensors 2022, 22, 9592. [Google Scholar] [CrossRef]
  25. Meng, T.X.; Buchanan, W. Lightweight Cryptographic Algorithms on Resource-Constrained Devices. Preprints 2020, 2020090302. [Google Scholar] [CrossRef]
  26. Fotovvat, A.; Rahman, G.M.E.; Vedaei, S.S.; Wahid, K.A. Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes. IEEE Internet Things 2020, 8, 8279–8290. [Google Scholar] [CrossRef]
  27. Singh, S.; Sharma, P.K.; Moon, S.Y.; Park, J.H. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions. J. Ambient Intell. Humaniz. Comput. 2017, 1–18. [Google Scholar] [CrossRef]
  28. Dhanda, S.S.; Singh, B.; Jindal, P. Lightweight Cryptography: A Solution to Secure IoT. Wirel. Pers. Commun. 2020, 112, 1947–1980. [Google Scholar] [CrossRef]
  29. Rana, M.; Mamun, Q.; Islam, R. Lightweight Cryptography in IoT Networks: A Survey. Future Gener. Comput. Syst. 2022, 129, 77–89. [Google Scholar] [CrossRef]
  30. Shahzad, K.; Zia, T.; Qazi, E.U.H. A Review of Functional Encryption in IoT Applications. Sensors 2022, 22, 7567. [Google Scholar] [CrossRef] [PubMed]
  31. Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
  32. Harbi, Y.; Aliouat, Z.; Refoufi, A.; Harous, S. Recent Security Trends in Internet of Things: A Comprehensive Survey. IEEE Access 2021, 9, 113292–113314. [Google Scholar] [CrossRef]
  33. Thakor, V.A.; Razzaque, M.A.; Khandaker, M.R.A. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison, and Research Opportunities. IEEE Access 2021, 9, 28177–28193. [Google Scholar] [CrossRef]
  34. Thabit, F.; Can, O.; Aljahdali, A.O.; Al-Gaphari, G.H.; Alkhzaimi, H.A. A Comprehensive Literature Survey of Cryptography Algorithms for Improving the IoT Security. Internet Things 2023, 22, 100759. [Google Scholar] [CrossRef]
  35. Tao, H.; Bhuiyan, M.Z.A.; Abdalla, A.N.; Hassan, M.M.; Zain, J.M.; Hayajneh, T. Secured Data Collection with Hardware-Based Ciphers for IoT-Based Healthcare. IEEE Internet Things J. 2018, 6, 410–420. [Google Scholar] [CrossRef]
  36. Lot, N.H.; Abdullah, N.A.N.; Rani, H.A. Statistical Analysis on KATAN Block Cipher. In Proceedings of the 2011 International Conference on Research and Innovation in Information Systems, Kuala Lumpur, Malaysia, 23–24 November 2011; pp. 1–6. [Google Scholar]
  37. Bovenizer, W.; Chetthamrongchai, P. A Comprehensive Systematic and Bibliometric Review of the IoT-Based Healthcare Systems. Clust. Comput. 2023, 26, 3291–3317. [Google Scholar] [CrossRef]
  38. Zhang, L.; Eichmann-Kalwara, N. Mapping the Scholarly Literature Found in Scopus on “Research Data Management”: A Bibliometric and Data Visualization Approach. J. Librariansh. Sch. Commun. 2019, 7, 1. [Google Scholar] [CrossRef]
  39. Ackerson, L.G.; Chapman, K. Identifying the Role of Multidisciplinary Journals in Scientific Research. Coll. Res. Libr. 2003, 64, 468–478. [Google Scholar] [CrossRef]
  40. Mingers, J.; Lipitakis, E. Counting the Citations: A Comparison of Web of Science and Google Scholar in the Field of Business and Management. Scientometrics 2010, 85, 613–625. [Google Scholar] [CrossRef]
  41. Bakkalbasi, N.; Bauer, K.; Glover, J.; Wang, L. Three Options for Citation Tracking: Google Scholar, Scopus, and Web of Science. Biomed. Digital Libr. 2006, 3, 1–8. [Google Scholar] [CrossRef] [PubMed]
  42. Archambault, É.; Campbell, D.; Gingras, Y.; Larivière, V. Comparing Bibliometric Statistics Obtained from the Web of Science and Scopus. J. Am. Soc. Inf. Sci. Technol. 2009, 60, 1320–1326. [Google Scholar] [CrossRef]
  43. Aria, M.; Cuccurullo, C. Bibliometrix: An R-Tool for Comprehensive Science Mapping Analysis. J. Inf. 2017, 11, 959–975. [Google Scholar] [CrossRef]
  44. Lwakatare, L.E.; Rånge, E.; Crnkovic, I.; Bosch, J. On the Experiences of Adopting Automated Data Validation in an Industrial Machine Learning Project. In Proceedings of the 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Madrid, Spain, 25–28 May 2021; pp. 248–257. [Google Scholar]
  45. Derviş, H. Bibliometric Analysis Using Bibliometrix: An R Package. J. Scientometr. Res. 2019, 8, 156–160. [Google Scholar] [CrossRef]
  46. Yu, Y.; Li, Y.; Zhang, Z.; Gu, Z.; Zhong, H.; Zha, Q.; Yang, L.; Zhu, C.; Chen, E. A Bibliometric Analysis Using VOSviewer of Publications on COVID-19. Ann. Transl. Med. 2020, 8, 816. [Google Scholar] [CrossRef] [PubMed]
  47. Atenstaedt, R. Word Cloud Analysis of the BJGP. Br. J. Gen. Pract. 2012, 62, 148. [Google Scholar] [CrossRef]
  48. Mulay, P.; Joshi, R.; Chaudhari, A. Distributed Incremental Clustering Algorithms: A Bibliometric and Word-Cloud Review Analysis. Sci. Technol. Libr. 2020, 39, 289–306. [Google Scholar] [CrossRef]
  49. Tayebi, S.; Manesh, S.; Khalili, M.; Sadi-Nezhad, S. The Role of Information Systems in Communication Through Social Media. Int. J. Data Netw. Sci. 2019, 3, 245–268. [Google Scholar] [CrossRef]
  50. Wang, X.; Lu, J.; Song, Z.; Zhou, Y.; Liu, T.; Zhang, D. From Past to Future: Bibliometric Analysis of Global Research Productivity on Nomogram (2000–2021). Front. Public Health 2022, 10, 997713. [Google Scholar] [CrossRef]
  51. Cahlik, T. Comparison of the Maps of Science. Scientometrics 2000, 49, 373–387. [Google Scholar] [CrossRef]
  52. Song, Y.; Chen, X.; Hao, T.; Liu, Z.; Lan, Z. Exploring Two Decades of Research on Classroom Dialogue by Using Bibliometric Analysis. Comput. Educ. 2019, 137, 12–31. [Google Scholar] [CrossRef]
  53. Pajankar, A.; Pajankar, A. Introduction to Single Board Computers and Raspberry Pi. In Raspberry Pi Image Processing Programming: Develop Real-Life Examples with Python, Pillow, and SciPy; Apress: Berkeley, CA, USA, 2017; pp. 1–24. [Google Scholar]
  54. Alabaichi, A.; Ahmad, F.; Mahmod, R. Security Analysis of Blowfish Algorithm. In Proceedings of the 2013 Second International Conference on Informatics Applications (ICIA), Lodz, Poland, 23–25 September 2013; pp. 12–18. [Google Scholar]
  55. Shah, K.R.; Gambhava, B. New Approach of Data Encryption Standard Algorithm. Int. J. Soft Comput. Eng. (IJSCE) 2012, 2, 322–325. [Google Scholar]
  56. Abdullah, A.M. Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data. Cryptogr. Netw. Secur. 2017, 16, 11. [Google Scholar]
Figure 1. Structure of bibliometric analysis.
Figure 1. Structure of bibliometric analysis.
Information 14 00635 g001
Figure 2. Article selection procedure.
Figure 2. Article selection procedure.
Information 14 00635 g002
Figure 3. Co-Author by Country.
Figure 3. Co-Author by Country.
Information 14 00635 g003
Figure 4. Co-occurrence of keywords.
Figure 4. Co-occurrence of keywords.
Information 14 00635 g004
Figure 5. Collaboration world map.
Figure 5. Collaboration world map.
Information 14 00635 g005
Figure 6. Collaboration network.
Figure 6. Collaboration network.
Information 14 00635 g006
Figure 7. Most relevant words.
Figure 7. Most relevant words.
Information 14 00635 g007
Figure 8. Word cloud.
Figure 8. Word cloud.
Information 14 00635 g008
Figure 9. Co-Word Net.
Figure 9. Co-Word Net.
Information 14 00635 g009
Figure 10. Word frequency over time.
Figure 10. Word frequency over time.
Information 14 00635 g010
Figure 11. Thematic map.
Figure 11. Thematic map.
Information 14 00635 g011
Figure 12. Trend topics.
Figure 12. Trend topics.
Information 14 00635 g012
Figure 13. Factorial analysis.
Figure 13. Factorial analysis.
Information 14 00635 g013
Figure 14. Bibliometric source.
Figure 14. Bibliometric source.
Information 14 00635 g014
Figure 15. Most relevant source.
Figure 15. Most relevant source.
Information 14 00635 g015
Figure 16. Source production over time.
Figure 16. Source production over time.
Information 14 00635 g016
Figure 17. Most relevant authors.
Figure 17. Most relevant authors.
Information 14 00635 g017
Figure 18. Author production over time.
Figure 18. Author production over time.
Information 14 00635 g018
Figure 19. Publication and citations.
Figure 19. Publication and citations.
Information 14 00635 g019
Table 2. Summary of article search.
Table 2. Summary of article search.
DatabaseSearch WithinSearch TermsTime RangeResultsExport File Format
ScopusKeywords“IoT” AND “Lightweight Cryptography”2015–2023585.CSV
ScopusKeywords“IoT” AND “Light weight Cryptography”2015–2023233.CSV
ScopusKeywords“IoT” AND “Light-weight Cryptography”2015–2023233.CSV
ScopusKeywords“Internet of Things” AND “Lightweight Cryptography”2015–2023816.CSV
ScopusKeywords“Internet of Things” AND “Light weight Cryptography”2015–2023357.CSV
ScopusKeywords“Internet of Things” AND “Light-weight Cryptography”2015–2023357.CSV
WOSAuthor Keywords“IoT” AND “Lightweight Cryptography”2015–2023134.xlsx
WOSAuthor Keywords“IoT” AND “Light weight Cryptography”2015–20237.xlsx
WOSAuthor Keywords“IoT” AND “Light-weight Cryptography”2015–20237.xlsx
WOSAuthor Keywords“Internet of Things” AND “Lightweight Cryptography”2015–2023119.xlsx
WOSAuthor Keywords“Internet of Things” AND “Light weight Cryptography”2015–20233.xlsx
WOSAuthor Keywords“Internet of Things” AND “Light-weight Cryptography”2015–20233.xlsx
IEEE XploreAuthor Keywords“IoT” AND “Lightweight Cryptography”2015–202377.CSV
IEEE XploreAuthor Keywords“IoT” AND “Light weight Cryptography”2015–20236.CSV
IEEE XploreAuthor Keywords“IoT” AND “Light-weight Cryptography”2015–20236.CSV
IEEE XploreAuthor Keywords“Internet of Things” AND “Lightweight Cryptography”2025-202379.CSV
IEEE XploreAuthor Keywords“Internet of Things” AND “Light weight Cryptography”2015–20235.CSV
IEEE XploreAuthor Keywords“Internet of Things” AND “Light-weight Cryptography”2015–20235.CSV
Table 3. This table shows the percentage of contribution by the top 5 countries.
Table 3. This table shows the percentage of contribution by the top 5 countries.
CountryPercentage of Contribution
India16.9
China15.2
USA11.0
South Korea7.3
United Kingdom6.9
Table 4. Collaboration network data.
Table 4. Collaboration network data.
Cluster NumberColor
1Red
2Blue
3Light Green
4Purple
5Orange
6Brown
7Pink
8Gray
9Green
10Dark orange
Table 5. Top 10 keywords and the number of appearances in the data set.
Table 5. Top 10 keywords and the number of appearances in the data set.
Key WordNumber of Appearances
Lightweight cryptography305
IoT262
Internet of Things247
Security151
Cryptography119
Lightweight119
Authentication90
Internet of Things (IoT)85
Encryption77
FPGA52
Table 6. Top 10 keywords and the number of appearances in the data set.
Table 6. Top 10 keywords and the number of appearances in the data set.
Key WordBetweennessClosenessPage Rank
Lightweight cryptography222.74562820.0178571430.113957932
IoT225.09876350.0185185190.106899186
Internet of Things237.69840630.0196078430.095832642
Security77.647617930.0166666670.073906234
Cryptography24.655285690.0140845070.05023756
Lightweight41.231714370.0149253730.049418078
Authentication18.678248760.0135135140.040011909
Internet of Things (IoT)16.40283790.0138888890.029672419
Encryption10.325524610.0129870130.039717612
FPGA3.447964440.0126582280.025962694
Table 7. Word frequency over time.
Table 7. Word frequency over time.
YearInternet of Thing/IoTCryptographyLightweight Cryptography/LightweightSecurityAuthentication
201811323823123
2019179351324732
2020252541956442
2021330802638756
202247110035411579
202350911942615190
Table 8. Cumulative source production over time.
Table 8. Cumulative source production over time.
YearIEEE AccessLecture Notes in Computer ScienceLecture Notes on Electronic EngineeringIEEE Internet of ThingsCommunications in Computer and Information Science
201880202
20191217538
202034236511
20214527161416
20225029202121
20235633233221
Table 9. Top 10 most relevant authors.
Table 9. Top 10 most relevant authors.
AuthorNumber of ArticlesArticles Fractionalized
Acharya, B.258.91
Bansod, G.155.6
Li, L.123.65
Mishra, Z.124.6
Yang, Y.122.82
Roy, S.112.43
Singh, P.113.25
Khan, S. J.102.16
Kim, H.92.25
Chehab, A.82.1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dewamuni, Z.; Shanmugam, B.; Azam, S.; Thennadil, S. Bibliometric Analysis of IoT Lightweight Cryptography. Information 2023, 14, 635. https://doi.org/10.3390/info14120635

AMA Style

Dewamuni Z, Shanmugam B, Azam S, Thennadil S. Bibliometric Analysis of IoT Lightweight Cryptography. Information. 2023; 14(12):635. https://doi.org/10.3390/info14120635

Chicago/Turabian Style

Dewamuni, Zenith, Bharanidharan Shanmugam, Sami Azam, and Suresh Thennadil. 2023. "Bibliometric Analysis of IoT Lightweight Cryptography" Information 14, no. 12: 635. https://doi.org/10.3390/info14120635

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop