Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices

被引:2
|
作者
Radhakrishnan, Indu [1 ]
Jadon, Shruti [1 ]
Honnavalli, Prasad B. [1 ]
机构
[1] PES Univ, Dept Comp Sci & Engn, Bengaluru 560085, India
关键词
LWC; IoT; benchmarking; resource-constrained devices; Arduino Nano; Arduino Micro; IMPLEMENTATION;
D O I
10.3390/s24124008
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The IoT has become an integral part of the technological ecosystem that we all depend on. The increase in the number of IoT devices has also brought with it security concerns. Lightweight cryptography (LWC) has evolved to be a promising solution to improve the privacy and confidentiality aspect of IoT devices. The challenge is to choose the right algorithm from a plethora of choices. This work aims to compare three different LWC algorithms: AES-128, SPECK, and ASCON. The comparison is made by measuring various criteria such as execution time, memory utilization, latency, throughput, and security robustness of the algorithms in IoT boards with constrained computational capabilities and power. These metrics are crucial to determine the suitability and help in making informed decisions on choosing the right cryptographic algorithms to strike a balance between security and performance. Through the evaluation it is observed that SPECK exhibits better performance in resource-constrained IoT devices.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
    Pandey, Shraiyash
    Bhushan, Bharat
    WIRELESS NETWORKS, 2024, 30 (04) : 2987 - 3026
  • [22] Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities
    Li, Shancang
    Song, Houbing
    Iqbal, Muddesar
    SENSORS, 2019, 19 (08):
  • [23] Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
    Fatima, Mahawish
    Rehman, Osama
    Rahman, Ibrahim M. H.
    Ajmal, Aisha
    Park, Simon Jigwan
    FUTURE INTERNET, 2024, 16 (10)
  • [24] Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey
    Khan, Muhammad Nauman
    Rao, Asha
    Camtepe, Seyit
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4132 - 4156
  • [25] FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
    Zhang, Mo
    Marin, Eduard
    Oswald, David
    Singelee, Dave
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 289 - 309
  • [26] An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security
    Rajat Sadhukhan
    Sikhar Patranabis
    Ashrujit Ghoshal
    Debdeep Mukhopadhyay
    Vishal Saraswat
    Santosh Ghosh
    Journal of Hardware and Systems Security, 2017, 1 (3) : 203 - 218
  • [27] Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices
    Suarez-Albela, Manuel
    Fraga-Lamas, Paula
    Castedo, Luis
    Fernandez-Carames, Tiago M.
    SENSORS, 2019, 19 (01)
  • [28] Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices
    Mursi, Khalid T.
    Zhuang, Yu
    Alkatheiri, Mohammed Saeed
    Aseeri, Ahmad O.
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 135 - 143
  • [29] Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT
    Tan, Jinbiao
    Shi, Jianhua
    Wan, Jiafu
    Dai, Hong-Ning
    Jin, Jiong
    Zhang, Rui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25558 - 25567
  • [30] MQTTSec Based on Context-Aware Cryptographic Selection Algorithm (CASA) for Resource-Constrained IoT Devices
    Massad, Mohammad A.
    Alsaify, Baha A.
    2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 349 - 354