Browse > Article
http://dx.doi.org/10.3745/KTCCS.2016.5.3.71

Analysis of the Cryptographic Algorithms's Performance on Various Devices Suitable for Underwater Communication  

Yun, Chae-Won (국민대학교 금융정보보안학과)
Lee, Jae-Hoon (국민대학교 금융정보보안학과)
Yi, Okyeon (국민대학교 수학과)
Shin, Su-Young (국민대학교 특수통신연구센터)
Park, Soo-Hyun (국민대학교 정보시스템전공)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.5, no.3, 2016 , pp. 71-78 More about this Journal
Abstract
Recently, The interest about underwater acoustic communication is increase such as marine resources, disaster prevention, weather prediction, and so on. Because the underwater acoustic communication uses a water as media, the underwater acoustic communication has a lot of restrictions. Although the underwater acoustic communication is hard, it is important to consider the security. In this paper, we estimate the performance of cryptographic algorithms(AES, ARIA, and LEA) on a various devices, available in underwater acoustic communication, and analysis the results. This result will be provide effective data confidentiality for underwater communication.
Keywords
Underwater Sensor Network; Underwater Acoustic Communication; Cryptographic Algorithm; Performance;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges," Ad Hoc Networks, Vol.3, No.3, pp.257-279, 2005.   DOI
2 Z. Jiang, "Underwater acoustic networks-issues and solutions," International Journal of Intelligent Control and Systems, Vol.13, No.3, pp.152-161, 2008.
3 Nist Special Publication 800-57, Recommendation for Key Management-Part 1 : General, March, 2007 [Internet], http://csrc.nist.gov.
4 J. Daemen and V. Rijmen, "The Design of Rijndael: AES-the Advanced Encryption Standard," Springer Science & Business Media, 2013.
5 A. Biryukov, C. De Canniere, J. Lano, S. B. Ors, and B. Preneel, "Security and performance analysis of ARIA," Final Report, KU Leuven ESAT/SCD-COSIC, Vol.3, p.4, 2004.
6 D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Applications, Springer International Publishing, pp.3-27, 2014.
7 D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Application, Springer International Publishing, pp.3-27, 2013.
8 J. Yiu, "The definitive guide to the ARM Cortex-M3," Newnes, 2009.
9 A. A. ATmega, 128L-8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash, Rev. 2467M-AVR-11/04.
10 Intel Edison Platform [Internet], http://www.intel.com/content/www/us/en/do-it-yourself/edison.html.
11 Arduino Platform [Internet], http://www.arduino.cc.
12 Jin-Young Lee, Nam-Yeol Yun, and Soo-Hyun Park, "Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks," Journal of the Institute of Electronics and Information Engineers, Vol.51, No.4, pp.76-89, April, 2014.   DOI