DOI QR코드

DOI QR Code

Analysis of the Cryptographic Algorithms's Performance on Various Devices Suitable for Underwater Communication

수중통신에 활용가능한 다양한 플랫폼에서의 암호 알고리즘 성능비교

  • 윤채원 (국민대학교 금융정보보안학과) ;
  • 이재훈 (국민대학교 금융정보보안학과) ;
  • 이옥연 (국민대학교 수학과) ;
  • 신수영 (국민대학교 특수통신연구센터) ;
  • 박수현 (국민대학교 정보시스템전공)
  • Received : 2015.12.22
  • Accepted : 2016.02.26
  • Published : 2016.03.31

Abstract

Recently, The interest about underwater acoustic communication is increase such as marine resources, disaster prevention, weather prediction, and so on. Because the underwater acoustic communication uses a water as media, the underwater acoustic communication has a lot of restrictions. Although the underwater acoustic communication is hard, it is important to consider the security. In this paper, we estimate the performance of cryptographic algorithms(AES, ARIA, and LEA) on a various devices, available in underwater acoustic communication, and analysis the results. This result will be provide effective data confidentiality for underwater communication.

최근 환경오염에 의한 수질관리, 재난방지, 해양자원탐사 및 군사목적 등으로 수중환경에서의 음파통신에 대한 관심이 증가하고 있다. 그러나 수중네트워크는 물이라는 특수한 환경으로 인해 많은 제약사항이 존재한다. 이를 극복하기 위한 노력은 계속되고 있으며 더불어 보안의 필요성도 함께 중요시 되고 있다. 본 논문에서는 수중 음파통신에서 활용가능한 다양한 플랫폼에서 AES, ARIA, LEA 암호 알고리즘의 성능을 측정하고 그 결과를 비교 분석하여, 향후 수중 네트워크에서의 통신에 효율적으로 기밀성을 제공할 수 있도록 한다.

Keywords

References

  1. I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges," Ad Hoc Networks, Vol.3, No.3, pp.257-279, 2005. https://doi.org/10.1016/j.adhoc.2005.01.004
  2. Z. Jiang, "Underwater acoustic networks-issues and solutions," International Journal of Intelligent Control and Systems, Vol.13, No.3, pp.152-161, 2008.
  3. Nist Special Publication 800-57, Recommendation for Key Management-Part 1 : General, March, 2007 [Internet], http://csrc.nist.gov.
  4. J. Daemen and V. Rijmen, "The Design of Rijndael: AES-the Advanced Encryption Standard," Springer Science & Business Media, 2013.
  5. A. Biryukov, C. De Canniere, J. Lano, S. B. Ors, and B. Preneel, "Security and performance analysis of ARIA," Final Report, KU Leuven ESAT/SCD-COSIC, Vol.3, p.4, 2004.
  6. D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Applications, Springer International Publishing, pp.3-27, 2014.
  7. D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Application, Springer International Publishing, pp.3-27, 2013.
  8. J. Yiu, "The definitive guide to the ARM Cortex-M3," Newnes, 2009.
  9. A. A. ATmega, 128L-8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash, Rev. 2467M-AVR-11/04.
  10. Intel Edison Platform [Internet], http://www.intel.com/content/www/us/en/do-it-yourself/edison.html.
  11. Arduino Platform [Internet], http://www.arduino.cc.
  12. Jin-Young Lee, Nam-Yeol Yun, and Soo-Hyun Park, "Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks," Journal of the Institute of Electronics and Information Engineers, Vol.51, No.4, pp.76-89, April, 2014. https://doi.org/10.5573/IEIE.2014.51.4.076