A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

被引:4
|
作者
Winarno, Agus [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok 16424, Indonesia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 17期
关键词
MQTT; block cipher; lightweight cryptography; secret sharing; IoT;
D O I
10.3390/app12178817
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Personal data security is a cybersecurity trend that has captured the world's attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely used in IoT implementation is MQTT. By default, MQTT does not provide data security features in the form of data encryption. Therefore, this research was carried out on the design of Secure End-to-End Encryption MQTT with Block Cipher-Based Lightweight Cryptography. The protocol is designed by utilizing the Galantucci secret sharing scheme and a lightweight cryptographic algorithm based on a block cipher. The algorithms used include AES-128 GCM mode, GIFT-COFB, Romulus N1, and Tiny JAMBU. We tested the Secure End-to-End for MQTT protocol on the ARM M4 and ESP8266 processors. Our testing results on NodeMCU board, Tiny JAMBU have an average encryption time of 313 mu s and an average decryption time of 327 mu s. AES-128 GCM mode has an average encryption time of 572 mu s and an average decryption time of 584 mu s. GIFT-COFB has an average encryption time of 1094 mu s and an average decryption time of 1110 mu s. Meanwhile, Romulus N1 has an average encryption time of 2157 mu s and an average decryption time of 2180 mu s. On STM32L4 discovery, Tiny JAMBU had average encryption of 82 mu s and an average decryption time of 85 mu s. AES-128 GCM mode has an average encryption time of 163 mu s and an average decryption time of 164 mu s. GIFT-COFB has an average encryption time of 164 mu s and an average decryption time of 165 mu s. Meanwhile, Romulus N1 has an average encryption time of 605 mu s and an average decryption time of 607 mu s. Our experiment shows that the fastest performance is produced by Tiny JAMBU, followed by AES-128 Mode GCM, GIFT-COFB and Romulus N1.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A Secure IoT System Using Quantum Cryptography with Block Cipher
    Abdulkader, Zaid A.
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2021, 24 (05): : 771 - 776
  • [2] PVW: An Efficient Dynamic Symmetric Cipher to Enable End-to-End Secure Communication
    Panchami, V
    Paul, Varghese
    Wahi, Amitabh
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 329 - 338
  • [3] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [4] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    [J]. IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [5] Lightweight End-to-End Blockchain for IoT Applications
    Lee, Seungcheol
    Lee, Jaehyun
    Hong, Sengphil
    Kim, Jae-Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08) : 3224 - 3242
  • [6] A Secure End-to-End Mobile Chat Scheme
    Chen , Hsing-Chung
    Wen, Jyh-Horng
    Yang, Cheng-Ying
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 472 - 477
  • [7] Multi-Layered IoT System Design Towards End-to-End Secure Communication
    Rech, Alexander
    Gressl, Lukas
    Basic, Fikret
    Seifert, Christian
    Steger, Christian
    Sinnhofer, Andreas
    [J]. IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 2213 - 2220
  • [8] SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation
    Hamad, Mohammad
    Finkenzeller, Andreas
    Liu, Hangmao
    Lauinger, Jan
    Prevelakis, Vassilis
    Steinhorst, Sebastian
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3384 - 3406
  • [9] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [10] Energy aware Clustered blockchain data for IoT: An end-to-end lightweight secure & Enroute filtering approach
    Ramamoorthi, S.
    Kumar, B. Muthu
    Appathurai, Ahilan
    [J]. COMPUTER COMMUNICATIONS, 2023, 202 : 166 - 182