An investigation on cryptographic algorithms usage in IoT contexts

  • Authors

    • R H Aswathy
    • N Malarvizhi
    https://doi.org/10.14419/ijet.v7i1.7.9379

    Received date: February 4, 2018

    Accepted date: February 4, 2018

    Published date: February 5, 2018

  • IoT (Internet of Things), AES (Advanced Encryption Standard), ECC (Elliptic Curve Cryptography), DES (Data Encryption Standard).
  • Abstract

    The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.

  • References

    1. Ashton k. That ‘Internet of Things’ thing.RFID Journal, 2011.
    2. Saurabh Singh1 · Pradip Kumar Sharma1 · Seo Yeon Moon1 · Jong Hyuk Park1“Advanced lightweight encryption algorithms for IoT devices:survey, challenges and solution”,Springer, DOI 10.1007/s12652-017-0494-4.
    3. STAMFORD (2013) Gartner says the internet of things installed basewill grow to 26 billion units by 2020. http://www.gartner.com/newsroom/id/2636073. Accessed 16 Jan 2017
    4. D. Bonino, M. T. D. Alizo, A. Alapetite, T. Gilbert, M. Axling, H. U. andJose Angel Carvajal Soto, and M. Spirito, “Almanac: Internet of things for smart cities,” in Future Internet of Things and Cloud(FiCloud), 2015 3rd International Conference on, Aug 2015, pp. 309– 316.
    5. Mingyuan Xin,”A Mixed Encryption Algorithm Used in Internet of Things Security TransmissionSystem”, Computer and Information Engineering College University of Heihe, China,IEEE 978-1-4673-9200-6/15 $31.00 © 2015 IEEE.
    6. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao,June 2013“A Modi-fied RSA Encryption Technique Based on Multiple public keys”, In-ternational Journal of Innovative Research in Computer and Com-municationEngineering Vol. 1, Issue 4.
    7. Jawahar Thakur, Nagesh Kumar,” DES, AES and Blowfish: Sym-metric Key Cryptography Algorithms Simulation Based Performance Analysis“, International Journal of Emerging Technology and Ad-vanced Engineering. Website: www.ijetae.com(ISSN 2250-2459,Volume 1, Issue 2, December 2011)
    8. Tarun Kumar Goyal,Vineet Sahula,”Lightweight Security Algorithm for Low Power IoT Devices”, (ICACCI), Sept. 21-24, 2016, Jaipur, India.
    9. Fan X, Mandal K, Gong G (2013) Wg-8: “A lightweight stream ci-pher for resource-constrained smart devices”,In: Proceeding of Inter-nationalConference on Heterogeneous Networking for Quality, Reli-ability, Security and Robustness, Springer, Berlin, pp 617–632. https://doi.org/10.1007/978-3-642-37949-9_54.
    10. Iokibe K, Maeshima K, Kagotani H, Nogami Y, Toyota, Y, WatanabeT (2014) “Analysis on equivalent current source of AES-128circuit for HD power model verification”, In: Proceeding of 2014 International Symposium on Electromagnetic Compatibility,Tokyo (EMC’14/Tokyo), IEEE, pp 302–305
    11. Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Rob-shaw MJ, Vikkelsoe C (2007),”An ultra-lightweightblock cipher. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems”, Springer, Berlin, pp 450–466.
    12. Souissi R, Ben-Ammar M (2014),”An intelligent wireless sensor network temperature acquisition system with an FPGA”. Wire SensNetworks.
  • Downloads

  • How to Cite

    Aswathy, R. H., & Malarvizhi, N. (2018). An investigation on cryptographic algorithms usage in IoT contexts. International Journal of Engineering and Technology, 7(1.7), 10-14. https://doi.org/10.14419/ijet.v7i1.7.9379