A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers

被引:0
|
作者
Soto-Cruz, Jesus [1 ]
Ruiz-Ibarra, Erica [1 ]
Vazquez-Castillo, Javier [2 ]
Espinoza-Ruiz, Adolfo [1 ]
Castillo-Atoche, Alejandro [3 ]
Mass-Sanchez, Joaquin [1 ]
机构
[1] Inst Tecnol Sonora, Dept Ingn Electr & Elect, ITSON, Obregon 85130, Mexico
[2] Univ Autonoma Estado Quintana Roo UQROO, Dept Redes Informat, Chetmal 77019, Mexico
[3] Univ Autonoma Yucatan, Dept Mecatron, Merida 97000, Mexico
关键词
Internet of Things; data security; wireless sensor network; lightweight encryption; STREAM CIPHER; SECURITY;
D O I
10.3390/technologies13010003
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Protecting sensitive data, such as data collected from sensors, is crucial for ensuring the accurate assessment of sensing devices and preventing unauthorized access. In this regard, Internet of Things (IoT) devices offer a promising alternative for in situ monitoring. However, IoT sensing devices are often constrained by limited processing power and memory. Therefore, lightweight and efficient security algorithms are essential. This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. Experimental results demonstrate the performance of various lightweight encryption algorithms on low-power microcontrollers. The analysis reveals the comparative performance of these algorithms in terms of average power and energy consumption, memory usage, latency, and throughput.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers
    Malina, Lukas
    Hajny, Jan
    Mlynek, Petr
    Machacek, Jiri
    Svoboda, Radomir
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (10)
  • [42] Power-constrained device and technology design for the end of scaling
    Frank, DJ
    INTERNATIONAL ELECTRON DEVICES 2002 MEETING, TECHNICAL DIGEST, 2002, : 643 - 646
  • [43] Power-constrained constant modulus algorithm for synchronous CDMA
    Gu, M
    Tong, L
    NINTH IEEE SIGNAL PROCESSING WORKSHOP ON STATISTICAL SIGNAL AND ARRAY PROCESSING, PROCEEDINGS, 1998, : 116 - 119
  • [44] Secure AF Relaying in Power-Constrained UAV Networks
    Samara, Lutfi
    AlAbbasi, Abubakr O.
    El Shafie, Ahmed
    Hamila, Ridha
    Al-Dhahir, Naofal
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [45] Generation of power-constrained scan tests and its difficulty
    Iwagaki, Tsuyoshi
    Ohtake, Satoshi
    IDT 2007: SECOND INTERNATIONAL DESIGN AND TEST WORKSHOP, PROCEEDINGS, 2007, : 71 - +
  • [46] Power-Constrained Optimal Quality for High Performance Servers
    Mazouz, Abdelhafid
    Wong, David C.
    Kuck, David
    Jalby, William
    47TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP '18), 2018,
  • [47] Deployment algorithms for a power-constrained mobile sensor network
    Kwok, Andrew
    Martinez, Sonia
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2010, 20 (07) : 745 - 763
  • [48] Achievable Throughput in Power-Constrained Cognitive Wireless Networks
    Babaei, Alireza
    Jabbari, Bijan
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 1768 - 1772
  • [49] Power-Constrained Performance Scheduling of Data Parallel Tasks
    Anger, Eric
    Wilke, Jeremiah
    Yalamanchili, Sudhakar
    PROCEEDINGS OF 4TH INTERNATIONAL WORKSHOP ON ENERGY EFFICIENT SUPERCOMPUTING (E2SC 2016), 2016, : 1 - 7
  • [50] Radio Data Transmission Reduction in Power-Constrained WSN
    de Souza, Koffi V. C. Kevin
    Almhana, Jalal
    Fournier-Viger, Philippe
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 285 - 290