Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices

被引:2
|
作者
Radhakrishnan, Indu [1 ]
Jadon, Shruti [1 ]
Honnavalli, Prasad B. [1 ]
机构
[1] PES Univ, Dept Comp Sci & Engn, Bengaluru 560085, India
关键词
LWC; IoT; benchmarking; resource-constrained devices; Arduino Nano; Arduino Micro; IMPLEMENTATION;
D O I
10.3390/s24124008
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The IoT has become an integral part of the technological ecosystem that we all depend on. The increase in the number of IoT devices has also brought with it security concerns. Lightweight cryptography (LWC) has evolved to be a promising solution to improve the privacy and confidentiality aspect of IoT devices. The challenge is to choose the right algorithm from a plethora of choices. This work aims to compare three different LWC algorithms: AES-128, SPECK, and ASCON. The comparison is made by measuring various criteria such as execution time, memory utilization, latency, throughput, and security robustness of the algorithms in IoT boards with constrained computational capabilities and power. These metrics are crucial to determine the suitability and help in making informed decisions on choosing the right cryptographic algorithms to strike a balance between security and performance. Through the evaluation it is observed that SPECK exhibits better performance in resource-constrained IoT devices.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63
  • [2] Lightweight Security Algorithms for Resource-constrained IoT-based Sensor Nodes
    Sarker, Victor Kathan
    Tuan Nguyen Gia
    Tenhunen, Hannu
    Westerlund, Tomi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [3] Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
    Yasmin N.
    Gupta R.
    International Journal of Information Technology, 2024, 16 (4) : 2647 - 2659
  • [4] An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
    Rana, Sohel
    Hossain, Saddam
    Shoun, Hasan Imam
    Abul Kashem, Mohammod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 267 - 275
  • [5] Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
    Ohal, Hemlata Sandip
    Fatangare, Mrunal Pravinkumar
    Aware, Mrunal Swapnil
    Nehete, Pallavi Utkarsh
    Dongre, Nita Ganesh
    Kothoke, Priyanka M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 879 - 888
  • [6] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    IEEE ACCESS, 2021, 9 : 28177 - 28193
  • [7] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    IEEE Access, 2021, 9 : 28177 - 28193
  • [8] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [9] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [10] Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
    Ibrahim, Nahla
    Agbinya, Johnson
    APPLIED SCIENCES-BASEL, 2023, 13 (07):