Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher

被引:4
|
作者
Khan, Safiullah [1 ]
Inayat, Kashif [2 ,3 ]
Bin Muslim, Fahad [4 ]
Shah, Yasir Ali [5 ]
Rehman, Muhammad Atif Ur [1 ]
Khalid, Ayesha [6 ]
Imran, Malik [6 ]
Abdusalomov, Akmalbek [7 ,8 ]
机构
[1] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BX, England
[2] Incheon Natl Univ, Dept Elect Engn, Syst Chips Lab, Incheon 22012, South Korea
[3] Ctr Nacl Supercomputac, Barcelona Supercomp Ctr, Barcelona, Spain
[4] GIK Inst, Fac Comp Sci & Engn, Swabi 23460, Pakistan
[5] Ulster Univ, Sch Comp Engn & Intelligent Syst, Magee Campus, Londonderry BT48 7JL, North Ireland
[6] Queens Univ Belfast, Ctr Secure Informat Technol CSIT, Belfast BT7 1NN, North Ireland
[7] Gachon Univ, Dept Comp Engn, Seongnam 461701, South Korea
[8] Tashkent State Univ Econ, Dept Informat Syst & Technol, Tashkent 100066, Uzbekistan
关键词
Internet of Things; Lightweight cryptography; Ascon; ASIC implementations;
D O I
10.1007/s10207-024-00904-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) nodes consist of sensors that collect environmental data and then perform data exchange with surrounding nodes and gateways. Cybersecurity attacks pose a threat to the data security that is being transmitted in any IoT network. Cryptographic primitives are widely adopted to address these threats; however, the substantial computation demands limit their applicability in the IoT ecosystem. In addition, each IoT node varies with respect to the area and throughput (TP) requirements, thus demanding flexible implementation for encryption/decryption processes. To solve these issues, this work implements the NIST lightweight cryptography standard, Ascon, on a SAED 32 nm process design kit (PDK) library by employing loop folded, loop unrolled and fully unrolled architectures. The fully unrolled architecture can achieve the highest TP but at the cost of higher area utilisation. Unrolling by a lower factor results in lower area implementations, enabling the exploration of design space to tackle the trade-off between area and TP performance of the design. The implementation results show that, for loop folded architecture, Ascon-128 and Ascon-128a require 36.7k mu m2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\upmu \textrm{m}<^>{2}$$\end{document} and 38.5k mu m2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\upmu \textrm{m}<^>{2}$$\end{document} chip area, respectively compared to 277.1k mu m2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\upmu \textrm{m}<^>{2}$$\end{document} and 306.6k mu m2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\upmu \textrm{m}<^>{2}$$\end{document} required by their fully unrolled implementations. The proposed implementation strategies can adjust the number of rounds to accommodate the varied requirements of IoT ecosystems. An implementation with an open-source 45 nm PDK library is also undertaken for enhanced generalization and reproducibility of the results.
引用
收藏
页码:3653 / 3664
页数:12
相关论文
共 40 条
  • [31] A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
    Zaminkar, Mina
    Sarkohaki, Fateme
    Fotohi, Reza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (03)
  • [32] CoAP-Based Lightweight Interoperability Semantic Sensor and Actuator Ontology for IoT Ecosystem
    Suman, Sukhavasi
    Perumal, Thinagaran
    Mustapha, Norwati
    Yaakob, Razali
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2021, 12 (02) : 92 - 110
  • [33] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [34] FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
    Al-Shatari, Mohammed
    Hussin, Fawnizu Azmadi
    Abd Aziz, Azrina
    Witjaksono, Gunawan
    Xuan-Tu Tran
    IEEE ACCESS, 2020, 8 (08): : 207610 - 207618
  • [35] Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
    Zhu, Lei
    Gong, Jinyue
    Dong, Liang
    Zhang, Cong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5521 - 5537
  • [36] Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme
    Das, Sangjukta
    Namasudra, Suyel
    Deb, Suman
    Moreno Ger, Pablo
    Gonzalez Crespo, Ruben
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 18486 - 18494
  • [37] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Alawi A. Al-saggaf
    Tarek Sheltami
    Hoda Alkhzaimi
    Gamil Ahmed
    Arabian Journal for Science and Engineering, 2023, 48 : 2347 - 2357
  • [38] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Al-saggaf, Alawi A.
    Sheltami, Tarek
    Alkhzaimi, Hoda
    Ahmed, Gamil
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2347 - 2357
  • [39] Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem
    Sahraneshin, Tayebeh
    Malekhosseini, Razieh
    Rad, Farhad
    Yaghoubyan, S. Hadi
    WIRELESS NETWORKS, 2023, 29 (02) : 969 - 983
  • [40] Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem
    Tayebeh Sahraneshin
    Razieh Malekhosseini
    Farhad Rad
    S. Hadi Yaghoubyan
    Wireless Networks, 2023, 29 : 969 - 983