On the choice of the appropriate AES data encryption method for ZigBee nodes

被引:3
|
作者
Ottoy, G. [1 ,3 ]
Hamelinckx, T. [2 ,3 ]
Preneel, B. [1 ]
De Strycker, L. [2 ,3 ]
Goemaere, J. -P. [2 ,3 ]
机构
[1] Katholieke Univ Leuven, COSIC Res Grp, B-3001 Leuven Heverlee, Belgium
[2] Katholieke Univ Leuven, TELEMIC Res Grp, B-3001 Leuven Heverlee, Belgium
[3] Catholic Univ, Coll Ghent, DraMCo Res Grp, B-9000 Ghent, Belgium
关键词
software encryption; hardware encryption; AES-CBC-MAC; ZigBee; AREA;
D O I
10.1002/sec.267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the experiments that have been conducted to determine the optimal implementation method for AES ( Advanced Encryption Standard) data encryption in a ZigBee network in terms of energy consumption. Four possible scenarios have been considered. The first one is a freely available AES-cryptographic algorithm on the processor which controls the ZigBee nodes. The second also involves the processor but is based on a proprietary, highly optimized algorithm. The other methods are based on hardware implementations. Whereas the third option is based on a cryptographic block, embedded in the ZigBee node controller, the last solution utilizes an AES128-CBC-MAC hardware co-processor embedded on a Spartan 3A FPGA. The ZigBee modules in the network contain an 8-bit microcontroller which takes care of the ZigBee protocol stack-and the encryption calculations in all but the last case. All approaches are examined and compared. We show that the usage of a microcontroller with an on-board AES processor is the optimal design choice for a new hardware platform. An optimized software library gives the best results when extending an existing platform. This paper gives developers an idea of the amount of energy they can gain/lose by choosing one of the four solutions. Copyright (c) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [1] Improved DPA Attack Method on AES Encryption
    Lan, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 448 - 449
  • [2] Efficient cluster organization method of zigbee nodes
    Woo, S.-J. (cliot@wooam.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [3] High Performance Data Encryption with AES Implementation on FPGA
    Chen, Shuang
    Hu, Wei
    Li, Zhenhao
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 149 - 153
  • [4] Research on Improved Data Encryption Algorithm Based on AES
    Chen, Rumeng
    Cheng, Xiaohui
    ICIIP'18: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING, 2018, : 198 - 201
  • [5] Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
    Shukur, Wisam Abed
    Qurban, Luheb Kareem
    Aljuboori, Ahmed
    BAGHDAD SCIENCE JOURNAL, 2023, 20 (04) : 1414 - 1424
  • [6] quantro: a data-driven approach to guide the choice of an appropriate normalization method
    Stephanie C. Hicks
    Rafael A. Irizarry
    Genome Biology, 16
  • [7] quantro: a data-driven approach to guide the choice of an appropriate normalization method
    Hicks, Stephanie C.
    Irizarry, Rafael A.
    GENOME BIOLOGY, 2015, 16
  • [8] A new method of image encryption using advanced encryption Standard (AES) for network security
    Inam, Saba
    Kanwal, Shamsa
    Firdous, Rabia
    Zakria, Khansa
    Hajjej, Fahima
    PHYSICA SCRIPTA, 2023, 98 (12)
  • [9] Rapid Encryption Method Based on AES Algorithm for Grey Scale HD Image Encryption
    Wadi, Salim M.
    Zainal, Nasharuddin
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 51 - 56
  • [10] Word-based AES encryption without data expansion
    1600, Institute of Information Science (32):