International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 11 Issue: 10 DOI: https://doi.org/10.17762/ijritcc.v11i10.8488 Article Received: 27 July 2023 Revised: 14 September 2023 Accepted: 02 October 2023 ___________________________________________________________________________________________________________________ 257 IJRITCC | October 2023, Available @ http://www.ijritcc.org A State-of-the-Art Survey for IoT Security and Energy Management based on Hashing Algorithms Teba Mohammed Ghazi Sami 1 , Subhi R. M. Zeebaree 2 , Sarkar Hasan Ahmed 3 1 Computer Science Department, Faculty of Science, University of Zakho, Duhok, Iraq; teba.sami@uoz.edu.krd 2 Energy Eng. Dept., Technical College of Engineering, Duhok Polytechnic University, Duhok, Iraq; subhi.rafeeq@dpu.edu.krd 3 Network Department, Sulaimani Polytechnic University, Sulaimani, Iraq; sarkar.ahmed@spu.edu.iq Abstract The Internet of Things (IoT) has developed as a disruptive technology with wide-ranging applications across several sectors, enabling the connecting of devices and the acquisition of substantial volumes of data. Nevertheless, the rapid expansion of networked gadgets has generated substantial apprehensions pertaining to security and energy administration. This survey paper offers a detailed examination of the present state of research and advancements in the field of Internet of Things (IoT) security and energy management. The work places special emphasis on the use of hashing algorithms in this context. The security of the Internet of Things (IoT) is a crucial element in safeguarding the confidentiality, integrity, and availability of data inside IoT environments. Hashing algorithms have gained prominence as a fundamental tool for enhancing IoT security. This survey reviews the state of the art in cryptographic hashing techniques and their application in securing IoT devices, data, and communication. Furthermore, the efficient management of energy resources is essential to prolong the operational lifespan of IoT devices and reduce their environmental impact. Hashing algorithms are also instrumental in optimizing energy consumption through data compression, encryption, and authentication. This survey explores the latest advancements in energy-efficient IoT systems and how hashing algorithms contribute to energy management strategies. Through a comprehensive analysis of recent research findings and technological advancements, this survey identifies key challenges and open research questions in the fields of IoT security and energy management based on hashing algorithms. It provides valuable insights for researchers, practitioners, and policymakers to further advance the state of the art in these critical IoT domains. Keywords: IoT, Security, Energy Management, Hashing Algorithms, SHA family. 1. Introduction The Internet of Things (IoT) has transformed the way we perceive and interact with the digital world, fostering unprecedented connectivity and data-driven insights across various domains. As IoT deployments continue to proliferate, encompassing smart homes, industrial automation, healthcare systems, and beyond, the need for robust security mechanisms and efficient energy management strategies has become more pressing than ever [1]. This state-of-the-art survey delves into the realms of IoT security and energy management, with a specific emphasis on the pivotal role played by hashing algorithms in addressing these critical challenges. IoT is a dynamic ecosystem comprising an extensive network of interconnected devices, sensors, and actuators that communicate and collaborate to collect, process, and share data. This interconnectedness has ushered in an era of unprecedented convenience, automation, and data-driven decision-making across sectors such as healthcare, transportation, agriculture, and smart cities. However, this proliferation of IoT devices also presents multifaceted security and energy management concerns that necessitate immediate attention [2]. Security is paramount in IoT systems, where data privacy, device integrity, and network resilience are of utmost importance. The vast array of interconnected devices and the potential vulnerabilities they introduce create a complex threat landscape. Unauthorized access, data breaches, and cyber- attacks not only jeopardize sensitive information but can also compromise the safety of individuals and the functionality of critical systems. To address these challenges, robust security measures are indispensable. Cryptographic hashing algorithms have emerged as a fundamental building block for IoT security [3]. These algorithms play a pivotal role in ensuring data confidentiality, integrity, and authenticity. By converting data into fixed-size hash codes, hashing algorithms enable secure data transmission, user authentication, and tamper detection. Furthermore, they support efficient encryption, digital signatures, and data deduplication, all of which are crucial in safeguarding IoT ecosystems. In tandem with security concerns, efficient energy management is a critical consideration in IoT deployments. Many IoT devices are battery-powered, making energy conservation paramount for prolonging device lifespan and reducing environmental impact [4]. Hashing algorithms contribute significantly to energy management by enabling data compression, reducing the