Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms

被引:2
作者
El-Hajj, Mohammed [1 ]
Fadlallah, Ahmad [2 ]
机构
[1] Twente Univ, EEMCS SCS, Enschede, Netherlands
[2] USAL Univ, Fac Arts & Sci, USAL, Beirut, Lebanon
来源
2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC) | 2022年
关键词
IoT; Constrained devices; lightweight cryptography; Raspberry PI; Arduino;
D O I
10.1109/ITNAC55475.2022.9998413
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyberphysical systems, distributed control systems, vehicular systems, wireless sensor networks, tele-medicine, and smart grid are a few examples of these fields. In any of these contexts, security and privacy might be essential aspects. Research on secure communication in Internet of Things (IoT) networks is a highly contested topic. One method for ensuring secure data transmission is cryptography. Since IoT devices have limited resources, such as power, memory, and batteries, IoT networks have boosted the term "lightweight cryptography". Algorithms for lightweight cryptography are designed to efficiently protect data while using minimal resources. In this research work, we evaluate and benchmark lightweight symmetric ciphers for resource-constrained devices. The evaluation is performed using two widely used platform: Arduino and Raspberry PI. In the first part, we implement 39 block ciphers on an ATMEGA328p micro-controller and analyze them in terms of speed, cost, and energy efficiency during encryption and decryption for different block and key sizes. In the second part, the 2nd round NIST candidates (80 stream and block cipher algorithms) were added to the first part ciphers in a comprehensive analysis for equivalent block and key sizes in terms of latency and energy efficiency.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 20 条
[1]   FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher [J].
Abed, Sa'ed ;
Jaffal, Reem ;
Mohd, Bassam Jamil ;
Alshayeji, Mohammad .
SENSORS, 2019, 19 (04)
[2]  
Benadjila R, 2014, LECT NOTES COMPUT SC, V8282, P324
[3]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[4]   Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment [J].
Dahiphale, Vijay ;
Raut, Hrishikesh ;
Bansod, Gaurav .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) :23659-23688
[5]  
Diehl W, 2017, I C FIELD PROG LOGIC
[6]  
Dwiel B. H., 2012, 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS), P188, DOI 10.1109/ISPASS.2012.6189225
[7]  
Eisenbarth Thomas, 2012, Progress in Cryptology - AFRICACRYPT 2012. Proceedings 5th International Conference on Cryptology in Africa, P172, DOI 10.1007/978-3-642-31410-0_11
[8]  
El-Haii M, 2018, P 2018 2 CYB SEC NET, P1
[9]  
El-Hajj M., 2021, PEER PEER NETW APPL, V194
[10]   A Survey of Internet of Things (IoT) Authentication Schemes [J].
El-hajj, Mohammed ;
Fadlallah, Ahmad ;
Chamoun, Maroun ;
Serhrouchni, Ahmed .
SENSORS, 2019, 19 (05)