An investigation on cryptographic algorithms usage in IoT contexts

  • Authors

    • R H Aswathy
    • N Malarvizhi
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.9379
  • IoT (Internet of Things), AES (Advanced Encryption Standard), ECC (Elliptic Curve Cryptography), DES (Data Encryption Standard).
  • Abstract

    The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.

  • References

    1. [1] Ashton k. That ‘Internet of Things’ thing.RFID Journal, 2011.

      [2] Saurabh Singh1 · Pradip Kumar Sharma1 · Seo Yeon Moon1 · Jong Hyuk Park1“Advanced lightweight encryption algorithms for IoT devices:survey, challenges and solutionâ€,Springer, DOI 10.1007/s12652-017-0494-4.

      [3] STAMFORD (2013) Gartner says the internet of things installed basewill grow to 26 billion units by 2020. http://www.gartner.com/newsroom/id/2636073. Accessed 16 Jan 2017

      [4] D. Bonino, M. T. D. Alizo, A. Alapetite, T. Gilbert, M. Axling, H. U. andJose Angel Carvajal Soto, and M. Spirito, “Almanac: Internet of things for smart cities,†in Future Internet of Things and Cloud(FiCloud), 2015 3rd International Conference on, Aug 2015, pp. 309– 316.

      [5] Mingyuan Xin,â€A Mixed Encryption Algorithm Used in Internet of Things Security TransmissionSystemâ€, Computer and Information Engineering College University of Heihe, China,IEEE 978-1-4673-9200-6/15 $31.00 © 2015 IEEE.

      [6] Amare Anagaw Ayele, Dr. Vuda Sreenivasarao,June 2013“A Modified RSA Encryption Technique Based on Multiple public keysâ€, International Journal of Innovative Research in Computer and CommunicationEngineering Vol. 1, Issue 4.

      [7] Jawahar Thakur, Nagesh Kumar,†DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis“, International Journal of Emerging Technology and Advanced Engineering. Website: www.ijetae.com(ISSN 2250-2459,Volume 1, Issue 2, December 2011)

      [8] Tarun Kumar Goyal,Vineet Sahula,â€Lightweight Security Algorithm for Low Power IoT Devicesâ€, (ICACCI), Sept. 21-24, 2016, Jaipur, India.

      [9] Fan X, Mandal K, Gong G (2013) Wg-8: “A lightweight stream cipher for resource-constrained smart devicesâ€,In: Proceeding of InternationalConference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Springer, Berlin, pp 617–632. https://doi.org/10.1007/978-3-642-37949-9_54.

      [10] Iokibe K, Maeshima K, Kagotani H, Nogami Y, Toyota, Y, WatanabeT (2014) “Analysis on equivalent current source of AES-128circuit for HD power model verificationâ€, In: Proceeding of 2014 International Symposium on Electromagnetic Compatibility,Tokyo (EMC’14/Tokyo), IEEE, pp 302–305

      [11] Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Vikkelsoe C (2007),â€An ultra-lightweightblock cipher. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systemsâ€, Springer, Berlin, pp 450–466.

      [12] Souissi R, Ben-Ammar M (2014),â€An intelligent wireless sensor network temperature acquisition system with an FPGAâ€. Wire SensNetworks.

  • Downloads

  • How to Cite

    Aswathy, R. H., & Malarvizhi, N. (2018). An investigation on cryptographic algorithms usage in IoT contexts. International Journal of Engineering & Technology, 7(1.7), 10-14. https://doi.org/10.14419/ijet.v7i1.7.9379

    Received date: 2018-02-04

    Accepted date: 2018-02-04

    Published date: 2018-02-05