Browse > Article
http://dx.doi.org/10.20465/KIOTS.2022.8.1.079

Comparison of encryption algorithm performance between low-spec IoT devices  

Park, Jung Kyu (Department of Computer Software Engineering, Changshin University)
Kim, Jaeho (Dept. of Aerospace and Software Engineering & AI Convergence Engineering, Gyeongsang National University)
Publication Information
Journal of Internet of Things and Convergence / v.8, no.1, 2022 , pp. 79-85 More about this Journal
Abstract
Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.
Keywords
IoT; BLE; mbed Platform; Cryptography; Binary Number Ring;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 S.N.Swamy and S.R.Kota, "An Empirical Study on System Level Aspects of Internet of Things (IoT)," IEEE Access, Vol.8, pp.188082-188134, 2020.   DOI
2 J.Hwang, L.Nkenyereye, N.Sung, J.Kim and J.Song, "IoT Service Slicing and Task Offloading for Edge Computing," IEEE Internet of Things Journal, Vol.8, No.14, pp.11526-11547, 2021.   DOI
3 A.M.Zarca, J.B.Bernabe, A.Skarmeta and J.M.Alcaraz Calero, "Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks," IEEE Journal on Selected Areas in Communications, Vol.38, No.6, pp.1262-1277, 2020.   DOI
4 H.Lee, "Intrusion Artifact Acquisition Method based on IoT Botnet Malware," Journal of The Korea Internet of Things Society, Vol.7, No.3, pp.1-8, 2021.
5 J.K.Park, J.Kim, "Real-Time Monitoring and Control System of Server Room based on IoT," Journal of The Korea Internet of Things Society, Vol.6, No.3, pp.7-13, 2020.   DOI
6 J.Hao, J.Liu, W.Wu, F.Tang and M.Xian, "Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT," IEEE Internet of Things Journal, Vol.7, No.2, pp.1140-1153, 2020.   DOI
7 S.Ramesh and M.Govindarasu, "An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data," IEEE Internet of Things Journal, Vol.7, No.9, pp.8700-8708, 2020.   DOI
8 J.Kim and A.Yun, "Secure Fully Homomorphic Authenticated Encryption," IEEE Access, Vol.9, pp.107279-107297, 2021.   DOI
9 S.Kim, "A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm," Vol.7, No.1, pp.1-7, 2021.
10 L. E. Kane, J. J. Chen, R. Thomas, V. Liu and M. Mckague, "Security and Performance in IoT: A Balancing Act," IEEE Access, Vol.8, pp.121969-121986, 2020.   DOI
11 H.Seo, J.K.Park, "The prevent method of data loss due to differences in bit rate between heterogeneous IoT devices," Journal of the Korea Institute of Information and Communication Engineering, Vol.23, No.7, pp.829-836, 2019.   DOI
12 K.Tsai, Y.Huang, F.Leu, I.You, Y.Huang and C.Tsai, "AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments," IEEE Access, Vol.6, pp.45325-45334, 2018.   DOI
13 K.Tsai, F.Leu, I.You, S.Chang, S.Hu and H.Park, "Low-Power AES Data Encryption Architecture for a LoRaWAN," IEEE Access, Vol.7, pp.146348-146357, 2019.   DOI
14 M.Lee, "Performance Evaluation of Smoothing Algorithm for Efficient Use of Network Resources in IoT environments," Journal of The Korea Internet of Things Society, Vol.7, No.2, pp.47-53, 2021.   DOI
15 Y.Su, B.Yang, C.Yang and L.Tian, "FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption," IEEE Access, Vol.8, pp.168008-168025, 2020.   DOI
16 K.E.Jeon, J.She, P.Soonsawad and P.C.Ng, "BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities," IEEE Internet of Things Journal, Vol.5, No.2, pp.811-828, 2018.   DOI
17 S.C.Cha, M.S.Chuang, K.H.Yeh, Z.J.Huang and C.Su, "A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices," IEEE Access, Vol.6, pp.20779-20787, 2018.   DOI
18 B.Luo, F.Xiang, Z.Sun and Y.Yao, "BLE Neighbor Discovery Parameter Configuration for IoT Applications," IEEE Access, Vol.7, pp.54097-54105, 2019.   DOI
19 Y.Ke, M.Q.Zhang, J.Liu, T.T.Su and X.Y. Yang, "Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain," IEEE Transactions on Circuits and Systems for Video Technology, Vol.30, No.8, pp.2353-2365, 2020.   DOI
20 C.Huang, H.Liu, W.Wang and J.Li, "A Compact and Cost-Effective BLE Beacon With Multiprotocol and Dynamic Content Advertising for IoT Application," IEEE Internet of Things Journal, Vol.7, No.3, pp.2309-2320, 2020.   DOI