Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform (original) (raw)

A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

2021

In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.

Analyzing the Efficiency of Lightweight Symmetric Ciphers on IoT Devices

2021

Modern Internet-of-Things (IoT) devices need to have their sensitive data encrypted, or they will be easily compromised. These resource-constrained IoT devices would need cryptographic algorithms that are both lightweight and secure. However, most conventional ciphers are not designed to run in a resource-constrained setting, making them inadequate for IoT devices. This paper analyzes the performance of several lightweight ciphers on a Raspberry Pi 4 Model B to reveal which of them is the most efficient on a resource-constrained IoT device. We gather the performance data for each algorithm through four metrics: average execution time for encryption and decryption, throughput, power consumption, and memory usage. We find that PRESENT and CHACHA20 are great options for a resource-constrained IoT device amongst our chosen ciphers.

Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey

IRJET, 2022

In a new computing world called “Internet of Things (IoT)” or “ Smart Objects ” networks, a lot of devices are connected to the Internet. They interact with each other through the network and give a new experience to us. In order to enjoy this new context, security of constrained end point is important. However, the network might be suffered seriously, If one of the end points were compromised. Still, it is not easy to apply sufficient cryptographic functions on constrained resources due to the limitation of their resources [1]. In this paper, a short discussion on the different IoT applications and challenges has been done. Further, the security worries concerning information sharing and following have been included. A comparable assessment of various lightweight encryption and approval estimations is finished. Also, some assessment headings described which further work ought to be adopted on lightweight cryptography estimations [2]

Comparative Study of Lightweight Cryptographic Algorithms for IoT

The deployment of IoT facilitates the physical devices with communication, computation and decision making on the basis of any action occurred on network medium. It raises the need of a secured communication channel among different categories of devices. A notable impact has been seen in our day to day life while communicating among smart devices due to the sudden enhancement in ICT technology. IoT enables users to communicate in heterogeneous environment as each user can deploy different way of communication and computation. Thus, this network becomes more prone to attack by a malicious user compromising security and privacy of network. Through the medium of this paper we try to perform indepth study of currently existing security mechanisms for IoT. First, we are comparing lightweight cryptographic mechanisms in concern with key and block sizes, number of rounds and possible attacks. Secondly, we try to discuss various existing security issues with their possible solutions. In a nutshell, a security solution with less computational complexity and less prone to attacks is required.

A survey of the current state of lightweight cryptography for the Internet of things

2017

The Internet of things offers a promising future for all stakeholders in technology; from researchers to consumers. It comprises a network of entities i.e. everyday objects; capable of sensing, processing, storing data and communicating with other entities. These entities or “things” can be connected to the internet and monitored or controlled through a service on another module like a mobile device or computer application. This model of ubiquitous computing presents a great challenge in the form of maintaining security i.e. confidentiality, integrity, authentication and non-repudiation of data as majority of the devices run on limited resources. Our paper examines the cryptographic solutions that have so far been developed, presents their strengths and weaknesses against each other and lays out some research gaps. We also present some notable institutions and groups that are researching and developing international standards in this field. The authors goal is that this paper is usa...

Energy Efficient Lightweight Cryptography Algorithms for IoT Devices

IETE Journal of Research, 2019

Over few decades, people have been working on providing security solutions, whereas attackers too have been working simultaneously. We present an evaluation of security algorithms, comparing performances and robustness. These comparisons are performed after hardware implementation and use crypt analysis. The targeted devices are wrist watches, RFID tags, IoT devices and others, which don't have a lot of areas (millions of gate equivalent). While performing this, the primary concern has been exploration of an algorithm that can work in these constrained limits. This led to a search for an algorithm that has low hardware footprints, low power consumption and better speed but at the same time implements adequate security. PRESENT has been found to be one such suitable algorithm. It has been also included in the new international standard for lightweight cryptographic methods under ISO/IEC 29192-2:2012 for its straight forward and light design. Our paper reports hardware implementation results of PRESENT, AES, ECDH, DH and RSA cryptography algorithms. We have implemented these algorithms with standard gate library of UMC-90 nm. Each algorithm has its own architecture and hence requires different crypt-analysis techniques like brute force, Pollard's Rho and biclique for "difficulty to break" measurement. It is a measure in term of time and data complexity of efforts required of a cryptographic attack. We have obtained 1.7× improvement in area and 63× improvement in power for modified PRESENT algorithm as compared to AES. It has also been observed that the proposed PRESENT algorithm has a time complexity of break attack as 2 127 for 128 bit key length.

Lightweight Cryptography for the Encryption of Data Communication of IoT Devices

Electronics

We are at the beginning of the age of the Internet of things. Soon, we will be surrounded by smart homes, cities, and infrastructure. To achieve this vision, millions of devices will have to be able to communicate with each other. The demands for communication channels will increase significantly. An increasing amount of data will be transmitted with a requirement of minimal delay. The capacities of transmission systems can be quickly depleted. Building new communication channels is very time consuming but also financially demanding. To maximize existing infrastructure, we should pay attention today to the issue of transmitted data. One of the ways is to focus attention on reducing the volume of transmitted data. In this paper, we present a method of reducing the volume of data transmission between a server and an IoT device, focusing on the bandwidth, transmission security, and system resources of the IoT device. The required reduction is achieved by data compression and replacing ...

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

International Journal of Innovative Technology and Exploring Engineering, 2020

Internet of Things IoT become a recent concept of communication technologies and a novel computing paradigm. The idea is to connect a variety of objects or things (e.g., RFID tags, NFC tags, sensors, etc.), which can interact and exchange data with each other anywhere and everywhere over the internet. With the evolution of IoT, the volume of data interchanged among connecting IoT devices is increasing at a remarkable scale due to the increase in number of the connected objects. Most of IoT devices are constrained devices and low resources that handling confidential and sensitive data. Therefore, using conventional cryptographic methods are unsuitable due to many issues and challenges like limited computational power, memory space, energy resources, performance cost, and security requirement. For that, lightweight cryptographic primitives (LWC) have been introduced. Many kinds of research continue moving forward to find a suitable algorithm that meets the specific demands of the IoT ...

A Lightweight Block Cipher Implementation in the Resource – Constrained Internet of Things

2019

The lightweight block ciphers are created for the resource-constrained Internet of Things (IoT). Hence, their implementations on software and/or hardware should augment the resource application. Thus, this study investigates the implementation of the modified Speck on two Arduino platforms to determine its performance on software and hardware separately. Through the analysis and comparison of experimental data results, it was found out that the ModSpeck has 0.25% higher statistical test compared to NIST standard accepted success rate and only 4% slower than its original cipher due to the employment of key derivation function in terms of software implementation. On its hardware performance tests, it uses only 50% more energy and consumes only 1.8% more memory as compared to selected lightweight algorithms. Its randomness exhibits good competitiveness in various aspects such as high throughput, low energy consumption and remarkable figure of merit.

Lightweight Cryptography to Secure Internet of Things(IoT

In Internet of Things (IoT), the huge connectivity of devices and massive data on the air have made information liable to different type of attacks. Cryptographic algorithms are used to provide confidentiality and maintain the integrity of the data. Lightweight cryptography could be a developing term which secures the information in an improved way utilizing low assets and giving higher throughput, conservativeness and having low power utilization. Lightweight algorithms are for the foremost part utilized as part of IoT innovation more model security with least memory and power utilization. The primary goal of cryptography is to secure the information specified lone the sender and beneficiary can determine and work the information and no other pariah or intruder can perceive or operate it.