Performance evaluation of lightweight Crypto functions for Internet of things applications
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the securi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Scientific Research
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/79758/7/79758%20Performance%20Evaluation%20of%20Lightweight.pdf http://irep.iium.edu.my/79758/13/79758_Performance%20evaluation%20of%20lightweight%20Crypto%20functions%20_Scopus.pdf http://irep.iium.edu.my/79758/ https://www.jardcs.org/abstract.php?id=3852# |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
Summary: | Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. The major issue in the design of a security system in IOT is in the device layer. This is due to the fact that the device layer consists of resource-constrained devices. The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. However, they do not work well with embedded systems and sensor networks. Thus lightweight cryptography methods are important. The lightweight (LW) crypto functions are designed for resource constrained devices with fixed block size and fixed permutation-based hash functions. The main LW crypto functions are Photon, Quark (QK), Spongent and Lesamnta. This paper compares between various LW crypto functions in terms of their power consumption, design, complexity and memory usage. In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications. |
---|