Journal ArticleDOI
Performance analysis of current lightweight stream ciphers for constrained environments
Subhrajyoti Deb,Bubu Bhuyan +1 more
Reads0
Chats0
TLDR
The statistical security, performance metrics and comparative analysis suggest the suitability of the selected ciphers for providing security in constrained environments.Abstract:
Maintaining an adequate balance between security and other performance metrics like memory requirement, throughput and energy requirement in a resource-constrained environment is a major challenge. The National Institute of Standards and Technology (NIST), in its latest lightweight cryptography report, suggested the suitability of symmetric ciphers in constrained devices. In this paper we have performed statistical security analyses of six state-of-the-art stream ciphers, namely Lizard, Fruit, Plantlet, Sprout, Grain v1 and Espresso, with the help of randomness test, structural test, autocorrelation test and avalanche test. We have also carried out the performance analysis of these ciphers in detail after porting the optimized code of the ciphers to a low-cost microcontroller, namely ATmega 328P. The selection of the device is based on its acceptability in the Internet of Things (IoT)-based network. The statistical security, performance metrics and comparative analysis suggest the suitability of the selected ciphers for providing security in constrained environments.read more
Citations
More filters
Journal ArticleDOI
A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
TL;DR: A novel protocol to thwart vulnerability of physical unclonable functions by limiting the adversary’s ability to intercept the whole challenge bits exchanged with IoT nodes by split the challenge bits over multiple messages and engage one or multiple helper nodes in the dissemination process.
Journal ArticleDOI
A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
TL;DR: In this article , the authors proposed a novel protocol to thwart the vulnerability of physical unclonable functions (PUFs) by limiting the adversary's ability to intercept the whole challenge bits exchanged with IoT nodes.
Peer Review
A systematic review of ultra-lightweight encryption algorithms
TL;DR: This paper is a comprehensive survey in lightweight and ultra-lightweight encryption algorithms and includes both the recently proposed ciphers (Block and Stream), and the latest cryptanalysis results.
Journal ArticleDOI
Reliability and availability of IoT devices in resource constrained environments
TL;DR: Empirical results demonstrate that encryption and decryption times increase nonlinearly rather than linearly as message size increases, which can accurately determine the optimal size of the message that can be processed by an IoT system employing controllers, which are running 8-bit or 64-bit architectures.
Journal ArticleDOI
Simple Authentication Method for Vehicle Monitoring IoT Device With Verifiable Data Integrity
TL;DR: In this article , the authors proposed a new authentication method for vehicular monitoring Internet of Things (IoT) systems based on parallel hash chains, which is suitable for low-power and low-cost IoT devices.
References
More filters
Journal ArticleDOI
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Book ChapterDOI
PRESENT: An Ultra-Lightweight Block Cipher
Andrey Bogdanov,Lars R. Knudsen,Gregor Leander,Christof Paar,Axel Poschmann,Matthew Robshaw,Yannick Seurin,C. Vikkelsoe +7 more
TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Journal Article
PRESENT: An Ultra-Lightweight Block Cipher
Andrey Bogdanov,Lars R. Knudsen,Gregor Leander,Christof Paar,Axel Poschmann,Matthew Robshaw,Yannick Seurin,C. Vikkelsoe +7 more
TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Journal ArticleDOI
A Survey on Security and Privacy Issues in Internet-of-Things
TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Book ChapterDOI
HIGHT: a new block cipher suitable for low-resource device
Deukjo Hong,Jaechul Sung,Seokhie Hong,Jongin Lim,Sangjin Lee,Bon-Seok Koo,Changhoon Lee,Donghoon Chang,Jesang Lee,Kitae Jeong,Hyun Kim,Jongsung Kim,Seongtaek Chee +12 more
TL;DR: This paper proposes a new block cipher HIGHT with 64-bit block length and 128-bit key length, which provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.