Securing RF Communication Using AES-256 Symmetric Encryption: A Performance Evaluation

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Radio Frequency (RF) communication plays a vital role for sensor node data transmission, which typically runs on top of lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process is known to be the common and most efficient method to protect RF communication. This paper presents the performance comparison of AES-encrypted data transmission over RF communication via Raspberry Pi boards, experimented on a client-server architecture. The performance analysis is measured based on throughput metric and the transmission time delay when sending three types of payload which are, a plaintext data, a ciphertext with padding and a ciphertext without padding. The result from the study indicates that there is a significant difference in data transmission time between the three types of data due to the data expansion factor. The result also showed that adding padding to the ciphertext has increased the data size slightly but not significant enough to affect transmission time of ciphertext.

     

     


  • Keywords


    cryptography; symmetric encryption; Advanced Encryption Standard; Raspberry Pi; RF Communication; Slice of Radio.

  • References


      [1] Paul B, Chiriyath A. R and Bliss D. W. Survey of RF communications and sensing convergence research. IEEE Access, 5, 252–270.

      [2] Saleh M. E, Aly A. A and Omara F. A. Data security using cryptography and steganography. Int. J. Adv. Comput. Sci. Appl., 2016, 7(6), 391–397.

      [3] Zakir M and Sarker H. A cost effective symmetric key cryptographic algorithm for small amount of data. Proceedings of the IEEE Int. Multitopic Conf., 2005, pp. 1–6.

      [4] F. Information. Announcing the Advanced Encryption Standard (AES). 2001.

      [5] Adnan S. F. S, Isa M. A. M, Rahman K. S. A, Muhamad M. H and Hashim H. Simulation of RSA and ElGamal encryption schemes using RF simulator. Proceedings of the IEEE Symp. Comput. Appl. Ind. Electron., 2015, pp. 124–128.

      [6] Isa M. A. M, Hashim H, Manan J. L. A, Adnan S. F. S and Mahmod R. RF simulator for cryptographic protocol. Proceedings of the IEEE Int. Conf. Control Syst. Comput. Eng., 2014, pp. 518–523.

      [7] Joshi A, Wazid M and Goudar R. H. An efficient cryptographic scheme for text message protection against brute force and cryptanalytic attacks. Procedia Comput. Sci., 48, 360–366.

      [8] Thota P and Kim Y. Implementation and Comparison of M2M Protocols for Internet of Things. Proceedings of the Int. Conf. Appl. Comput. Inf. Technol., 2017, pp. 43–48.

      [9] Alanazi H. O, Zaidan B. B, Zaidan A. A, Jalab H. A, and Shabbir M. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2010, 2(3), 152–157.

      [10] Singh G and Supriya S. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl., 2013, 67(19), 33–38.

      [11] Singhal N and Raina J. P. S. Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol., 2011, 2(6), 177–181.


 

View

Download

Article ID: 21388
 
DOI: 10.14419/ijet.v7i4.11.21388




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.