I. Introduction
The devices that need to secure data deal with the need to implement encryption methods to resist confidential attacks. Traditional encryption methods such as Advance Encryption Standard (AES) and Data encryption standard (DES) consume large amounts of power and memory [1] which is not available for small devices such as Internet of Things devices (IoT). These devices cannot utilize traditional encryption methods such as AES. In order to overcome the problem of power consumption, lightweight encryption have been developed to suite the devices made with constraint resources. The major goal of lightweight encryption techniques is to achieve highest level of encryption security for the devices characterized by lower power supply and end small memory provided. It is worth mentioning that one of the side benefits of adopting lightweight encryption techniques is to make the battery life supplied to the small device last for a long time helping many applications that are facing difficulties in replacing batteries, such as devices implemented in the human bodies for medical needs (Lara- Nino, Diaz-Perez et al. 2020, Thakor, Razzaque et al. 2021). The other significant problem facing the encryption system is when the devices are very large, in this case, the cryptosystem needs to be adaptable to beat the key management. In the big system which involve large number of devices, the key management is start to appear. Many research has been done in the key management field to keep key generation systems secure, the problem is when implement key management for small devices but with large number, in this case the research needs to develop key management approach that take in its account the power consumption limitation and other resource constrain. If the utilized key management approach fails, it can result in illegal access, data breaches, and compromised data integrity. Therefore, the significance of this research for IoT security and data integrity cannot be overstated, as it has the potential to significantly enhance the security and integrity of IoT systems.