Performance evaluation of lightweight Crypto functions for Internet of things applications

Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the securi...

Full description

Saved in:
Bibliographic Details
Main Authors: Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul
Format: Article
Language:English
English
Published: Institute of Advanced Scientific Research 2020
Subjects:
Online Access:http://irep.iium.edu.my/79758/7/79758%20Performance%20Evaluation%20of%20Lightweight.pdf
http://irep.iium.edu.my/79758/13/79758_Performance%20evaluation%20of%20lightweight%20Crypto%20functions%20_Scopus.pdf
http://irep.iium.edu.my/79758/
https://www.jardcs.org/abstract.php?id=3852#
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
Description
Summary:Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibility for an object to communicate with others and to collect information about the environment enables a broad range of application markets. One of the main challenges in the IOT system is in the security and privacy of the generated data. The major issue in the design of a security system in IOT is in the device layer. This is due to the fact that the device layer consists of resource-constrained devices. The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. However, they do not work well with embedded systems and sensor networks. Thus lightweight cryptography methods are important. The lightweight (LW) crypto functions are designed for resource constrained devices with fixed block size and fixed permutation-based hash functions. The main LW crypto functions are Photon, Quark (QK), Spongent and Lesamnta. This paper compares between various LW crypto functions in terms of their power consumption, design, complexity and memory usage. In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications.