바로가기메뉴

본문 바로가기 주메뉴 바로가기

Comparison of encryption algorithm performance between low-spec IoT devices

Journal of The Korea Internet of Things Society / Journal of The Korea Internet of Things Society, (P)2799-4791;
2022, v.8 no.1, pp.79-85
https://doi.org/https://doi.org/10.20465/kiots.2022.8.1.079


  • Downloaded
  • Viewed

Abstract

Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

keywords
사물인터넷, BLE, mbed 플랫폼, 암호학, 바이너리 숫자 링, IoT, BLE, mbed Platform, Cryptography, Binary Number Ring

Reference

1.

S.N.Swamy and S.R.Kota, "An Empirical Study on System Level Aspects of Internet of Things (IoT),"IEEE Access, Vol.8, pp.188082-188134, 2020.

2.

J.Hwang, L.Nkenyereye, N.Sung, J.Kim and J.Song, "IoT Service Slicing and Task Offloading for Edge Computing," IEEE Internet of Things Journal, Vol.8, No.14, pp.11526-11547, 2021.

3.

A.M.Zarca, J.B.Bernabe, A.Skarmeta and J.M.Alcaraz Calero, "Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks,"IEEE Journal on Selected Areas in Communications, Vol.38, No.6, pp.1262-1277, 2020.

4.

H.Lee, "Intrusion Artifact Acquisition Method based on IoT Botnet Malware," Journal of The Korea Internet of Things Society, Vol.7, No.3, pp.1-8, 2021.

5.

J.K.Park, J.Kim, "Real-Time Monitoring and Control System of Server Room based on IoT," Journal of The Korea Internet of Things Society, Vol.6, No.3, pp.7-13, 2020.

6.

J.Hao, J.Liu, W.Wu, F.Tang and M.Xian, "Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT," IEEE Internet of Things Journal, Vol.7, No.2, pp.1140-1153, 2020.

7.

S.Ramesh and M.Govindarasu, "An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data," IEEE Internet of Things Journal, Vol.7, No.9, pp.8700-8708, 2020.

8.

S.Kim, "A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm," Vol.7, No.1, pp.1-7, 2021.

9.

H.Seo, J.K.Park, "The prevent method of data loss due to differences in bit rate between heterogeneous IoT devices," Journal of the Korea Institute of Information and Communication Engineering, Vol.23, No.7, pp.829-836, 2019.

10.

K.Tsai, Y.Huang, F.Leu, I.You, Y.Huang and C.Tsai, "AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments," IEEE Access, Vol.6, pp.45325-45334, 2018.

11.

L. E. Kane, J. J. Chen, R. Thomas, V. Liu and M. Mckague, "Security and Performance in IoT: A Balancing Act," IEEE Access, Vol.8, pp.121969-121986, 2020.

12.

K.Tsai, F.Leu, I.You, S.Chang, S.Hu and H.Park, "Low-Power AES Data Encryption Architecture for a LoRaWAN," IEEE Access, Vol.7, pp.146348-146357, 2019.

13.

M.Lee, "Performance Evaluation of Smoothing Algorithm for Efficient Use of Network Resources in IoT environments," Journal of The Korea Internet of Things Society, Vol.7, No.2, pp.47-53, 2021.

14.

S.C.Cha, M.S.Chuang, K.H.Yeh, Z.J.Huang and C.Su, "A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices," IEEE Access, Vol.6, pp.20779-20787, 2018.

15.

C.Huang, H.Liu, W.Wang and J.Li, "A Compact and Cost-Effective BLE Beacon With Multiprotocol and Dynamic Content Advertising for IoT Application,"IEEE Internet of Things Journal, Vol.7, No.3, pp.2309-2320, 2020.

16.

K.E.Jeon, J.She, P.Soonsawad and P.C.Ng, "BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities," IEEE Internet of Things Journal, Vol.5, No.2, pp.811-828, 2018.

17.

B.Luo, F.Xiang, Z.Sun and Y.Yao, "BLE Neighbor Discovery Parameter Configuration for IoT Applications,"IEEE Access, Vol.7, pp.54097-54105, 2019.

18.

J.Kim and A.Yun, "Secure Fully Homomorphic Authenticated Encryption," IEEE Access, Vol.9, pp.107279-107297, 2021.

19.

Y.Su, B.Yang, C.Yang and L.Tian, "FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption," IEEE Access, Vol.8, pp.168008-168025, 2020.

20.

Y.Ke, M.Q.Zhang, J.Liu, T.T.Su and X.Y. Yang, "Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain," IEEE Transactions on Circuits and Systems for Video Technology, Vol.30, No.8, pp.2353-2365, 2020.

Journal of The Korea Internet of Things Society