A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers

被引:0
|
作者
Soto-Cruz, Jesus [1 ]
Ruiz-Ibarra, Erica [1 ]
Vazquez-Castillo, Javier [2 ]
Espinoza-Ruiz, Adolfo [1 ]
Castillo-Atoche, Alejandro [3 ]
Mass-Sanchez, Joaquin [1 ]
机构
[1] Inst Tecnol Sonora, Dept Ingn Electr & Elect, ITSON, Obregon 85130, Mexico
[2] Univ Autonoma Estado Quintana Roo UQROO, Dept Redes Informat, Chetmal 77019, Mexico
[3] Univ Autonoma Yucatan, Dept Mecatron, Merida 97000, Mexico
关键词
Internet of Things; data security; wireless sensor network; lightweight encryption; STREAM CIPHER; SECURITY;
D O I
10.3390/technologies13010003
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Protecting sensitive data, such as data collected from sensors, is crucial for ensuring the accurate assessment of sensing devices and preventing unauthorized access. In this regard, Internet of Things (IoT) devices offer a promising alternative for in situ monitoring. However, IoT sensing devices are often constrained by limited processing power and memory. Therefore, lightweight and efficient security algorithms are essential. This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. Experimental results demonstrate the performance of various lightweight encryption algorithms on low-power microcontrollers. The analysis reveals the comparative performance of these algorithms in terms of average power and energy consumption, memory usage, latency, and throughput.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] Finding the Limits of Power-Constrained Application Performance
    Bailey, Peter E.
    Marathe, Aniruddha
    Lowenthal, David K.
    Rountree, Barry
    Schulz, Martin
    PROCEEDINGS OF SC15: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2015,
  • [32] Power-Constrained Communications Using LDLC Lattices
    Kurkoski, Brian M.
    Dauwels, Justin
    Loeliger, Hans-Andrea
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 739 - +
  • [33] Information dissemination in power-constrained wireless networks
    Zheng, Rong
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 975 - 984
  • [34] Low-power, serial interface for power-constrained devices
    Degnan, Brian
    Hasler, Jennifer
    2015 IEEE 58TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2015,
  • [35] Power-constrained block-test list scheduling
    Muresan, V
    Wang, XJ
    Muresan, V
    Vladutiu, M
    11TH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING, PROCEEDINGS, 2000, : 182 - 187
  • [36] Stabilization Over Power-Constrained Parallel Gaussian Channels
    Shu, Zhan
    Middleton, Richard H.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2011, 56 (07) : 1718 - 1724
  • [37] SOFTCAST WITH PER-CARRIER POWER-CONSTRAINED CHANNELS
    Zheng, S.
    Antonini, M.
    Cagnazzo, M.
    Guerrieri, L.
    Kieffer, M.
    Nemoianu, I.
    Samy, R.
    Zhang, B.
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 2122 - 2126
  • [38] Lightweight Cryptography for Internet of Insecure Things: A Survey
    Dutta, Indira Kalyan
    Ghosh, Bhaskar
    Bayoumi, Magdy
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 475 - 481
  • [39] Deployment algorithms for a power-constrained mobile sensor network
    Kwok, Andrew
    Martinez, Sonia
    2008 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1-9, 2008, : 140 - 145
  • [40] POSTER - Firestorm: Operating Systems for Power-Constrained Architectures
    Panneerselvam, Sankaralingam
    Swift, Michael
    2016 INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURE AND COMPILATION TECHNIQUES (PACT), 2016, : 425 - 427