scispace - formally typeset
Journal ArticleDOI

Performance analysis of current lightweight stream ciphers for constrained environments

Reads0
Chats0
TLDR
The statistical security, performance metrics and comparative analysis suggest the suitability of the selected ciphers for providing security in constrained environments.
Abstract
Maintaining an adequate balance between security and other performance metrics like memory requirement, throughput and energy requirement in a resource-constrained environment is a major challenge. The National Institute of Standards and Technology (NIST), in its latest lightweight cryptography report, suggested the suitability of symmetric ciphers in constrained devices. In this paper we have performed statistical security analyses of six state-of-the-art stream ciphers, namely Lizard, Fruit, Plantlet, Sprout, Grain v1 and Espresso, with the help of randomness test, structural test, autocorrelation test and avalanche test. We have also carried out the performance analysis of these ciphers in detail after porting the optimized code of the ciphers to a low-cost microcontroller, namely ATmega 328P. The selection of the device is based on its acceptability in the Internet of Things (IoT)-based network. The statistical security, performance metrics and comparative analysis suggest the suitability of the selected ciphers for providing security in constrained environments.

read more

Citations
More filters
Journal ArticleDOI

A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

TL;DR: A novel protocol to thwart vulnerability of physical unclonable functions by limiting the adversary’s ability to intercept the whole challenge bits exchanged with IoT nodes by split the challenge bits over multiple messages and engage one or multiple helper nodes in the dissemination process.
Journal ArticleDOI

A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

TL;DR: In this article , the authors proposed a novel protocol to thwart the vulnerability of physical unclonable functions (PUFs) by limiting the adversary's ability to intercept the whole challenge bits exchanged with IoT nodes.
Peer Review

A systematic review of ultra-lightweight encryption algorithms

TL;DR: This paper is a comprehensive survey in lightweight and ultra-lightweight encryption algorithms and includes both the recently proposed ciphers (Block and Stream), and the latest cryptanalysis results.
Journal ArticleDOI

Reliability and availability of IoT devices in resource constrained environments

TL;DR: Empirical results demonstrate that encryption and decryption times increase nonlinearly rather than linearly as message size increases, which can accurately determine the optimal size of the message that can be processed by an IoT system employing controllers, which are running 8-bit or 64-bit architectures.
Journal ArticleDOI

Simple Authentication Method for Vehicle Monitoring IoT Device With Verifiable Data Integrity

TL;DR: In this article , the authors proposed a new authentication method for vehicular monitoring Internet of Things (IoT) systems based on parallel hash chains, which is suitable for low-power and low-cost IoT devices.
References
More filters
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Book ChapterDOI

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Journal Article

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Book ChapterDOI

HIGHT: a new block cipher suitable for low-resource device

TL;DR: This paper proposes a new block cipher HIGHT with 64-bit block length and 128-bit key length, which provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.
Related Papers (5)