Lizard Cipher for IoT Security on Constrained Devices

被引:0
|
作者
Kusyanti, Ari [1 ]
Primananda, Rakhmadhany [1 ]
Saputro, Kalbuadi Joyo [1 ]
机构
[1] Univ Brawijaya, Dept Informat Technol, Malang, Indonesia
关键词
Lizard cipher; IoT security; Arduino; ANOVA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past decades, security become the most challenging task in Internet of Things. Therefore, a convenient hardware cryptographic module is required to provide accelerated cryptographic operations such as encryption. This study investigates the implementation of Lizard cipher on three Arduino platforms to determine its performance. This study is successful in implementing Lizard cipher on Arduino platform as a constrained devices and resulting 0.98 MB of memory utilization. The execution time of Lizard cipher is compared among Arduino variants, i.e Arduino Mega, Arduino Nano and Arduino Uno with ANOVA test. Tukey's HSD post-hoc test reveales that the execution time is significantly slower in Arduino Mega compared to Arduino Nano and Arduino Uno. This result will help IoT security engineers in selecting a lightweight cipher that is suitable for constraints of the target device.
引用
收藏
页码:507 / 511
页数:5
相关论文
共 50 条
  • [21] IoT Security Issues and Light Weight Block Cipher
    Shin, Hyungsik
    Lee, Ho Kyoung
    Cha, Ho-Young
    Heo, Seo Weon
    Kim, Hyungtak
    2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019), 2019, : 381 - 384
  • [22] IIoTBC: A Lightweight Block Cipher for Industrial IoT Security
    Kuang, Juanli
    Guo, Ying
    Li, Lang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 97 - 119
  • [23] One round cipher algorithm for multimedia IoT devices
    Hassan Noura
    Ali Chehab
    Lama Sleem
    Mohamad Noura
    Raphaël Couturier
    Mohammad M. Mansour
    Multimedia Tools and Applications, 2018, 77 : 18383 - 18413
  • [24] Efficient and Secure Cipher Scheme for Limited IoT Devices
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - DCNET, OPTICS, SIGMAP AND WINSYS (ICETE), VOL 2, 2020, : 142 - 150
  • [25] One round cipher algorithm for multimedia IoT devices
    Noura, Hassan
    Chehab, Ali
    Sleem, Lama
    Noura, Mohamad
    Couturier, Raphael
    Mansour, Mohammad M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18383 - 18413
  • [26] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    SENSORS, 2024, 24 (12)
  • [27] Lightweight, Dynamic and Energy Efficient Security Mechanism for constrained IoT devices using CoAP
    Spina, Mattia Giovanni
    De Rango, Floriano
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [28] Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities
    Li, Shancang
    Song, Houbing
    Iqbal, Muddesar
    SENSORS, 2019, 19 (08):
  • [29] Designing a Block Cipher in Galois Extension Fields for IoT Security
    George, Kiernan
    Michaels, Alan J.
    IOT, 2021, 2 (04): : 669 - 687
  • [30] Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
    Ohal, Hemlata Sandip
    Fatangare, Mrunal Pravinkumar
    Aware, Mrunal Swapnil
    Nehete, Pallavi Utkarsh
    Dongre, Nita Ganesh
    Kothoke, Priyanka M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 879 - 888