Analysis of Lightweight Message Authentication Codes for IoT Environments

被引:0
|
作者
Saldamli, Gokay [1 ]
Ertaul, Levent [2 ]
Shankaralingappa, Asharani [2 ]
机构
[1] San Jose State Univ, Comp Engn Dept, San Jose, CA 95192 USA
[2] Calif State Univ East Bay, Dept Comp Sci, Hayward, CA USA
来源
2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC) | 2019年
关键词
IoT; CHASKEY; LightMAC; Lightweight MAC message size;
D O I
10.1109/fmec.2019.8795359
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Internet of Things (IoT) have spread everywhere from smart home to wireless sensor networks. The physical devices connected to the internet in IoT networks are resource constrained, so implementing security using conventional cryptographic algorithms are not suitable for these resource constrained devices. Recently, National Institute of Standards and Technology (NIST) has published the techniques of lightweight cryptography, which provides a way to implement security in a limited resource environment (IoT environment). Lightweight Message Authentication Code (MAC) is one of the technique in lightweight cryptography. This paper provides an overview of performance analysis of the lightweight cryptography algorithms, which are hash-based Lightweight MAC - LightMAC, CHASKEY on NUCLEO-F401RE IoT board, which has STM32F401RE microcontroller. Performance of these algorithms is analyzed based on the power consumption, memory consumption, execution time and throughput with various supported key sizes and message lengths.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
  • [21] A Lightweight Blockchain for the Internet of Medical Things Using Hash-based Message Authentication Codes
    Panasenko, Sergey
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1095 - 1100
  • [22] A study of blind message authentication codes
    Namprempre, Chanathip
    Neven, Gregory
    Abdalla, Michel
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 75 - 82
  • [23] Approximate image message authentication codes
    Xie, LH
    Arce, GR
    Graveman, RF
    IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) : 242 - 252
  • [24] MESSAGE AUTHENTICATION CODES AND DIFFERENTIAL ATTACK
    OHTA, K
    MATSUI, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 8 - 14
  • [25] Structurally aggregate message authentication codes
    Ishii, Yuta
    Tada, Mitsuru
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 339 - 343
  • [26] On the security of iterated message authentication codes
    Preneel, B
    van Oorschot, PC
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (01) : 188 - 199
  • [27] A Lightweight Authentication Mechanism between IoT Devices
    Han, Jin-Hee
    Kim, JeongNyeo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1153 - 1155
  • [28] Lightweight Authentication Scheme Based on ECC for IoT
    Sweta Mishra
    Bhaskar Mondal
    Rishi Kumar Jha
    SN Computer Science, 5 (7)
  • [29] Lightweight, Anonymous and Mutual Authentication in IoT Infrastructure
    Janbabaei, Shadi
    Gharaee, Hossein
    Mohammadzadeh, Naser
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 162 - 166
  • [30] Lightweight Mutual Authentication for IoT and Its Applications
    Li, Nan
    Liu, Dongxi
    Nepal, Surya
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2017, 2 (04): : 359 - 370