A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

被引:4
|
作者
Winarno, Agus [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok 16424, Indonesia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 17期
关键词
MQTT; block cipher; lightweight cryptography; secret sharing; IoT;
D O I
10.3390/app12178817
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Personal data security is a cybersecurity trend that has captured the world's attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely used in IoT implementation is MQTT. By default, MQTT does not provide data security features in the form of data encryption. Therefore, this research was carried out on the design of Secure End-to-End Encryption MQTT with Block Cipher-Based Lightweight Cryptography. The protocol is designed by utilizing the Galantucci secret sharing scheme and a lightweight cryptographic algorithm based on a block cipher. The algorithms used include AES-128 GCM mode, GIFT-COFB, Romulus N1, and Tiny JAMBU. We tested the Secure End-to-End for MQTT protocol on the ARM M4 and ESP8266 processors. Our testing results on NodeMCU board, Tiny JAMBU have an average encryption time of 313 mu s and an average decryption time of 327 mu s. AES-128 GCM mode has an average encryption time of 572 mu s and an average decryption time of 584 mu s. GIFT-COFB has an average encryption time of 1094 mu s and an average decryption time of 1110 mu s. Meanwhile, Romulus N1 has an average encryption time of 2157 mu s and an average decryption time of 2180 mu s. On STM32L4 discovery, Tiny JAMBU had average encryption of 82 mu s and an average decryption time of 85 mu s. AES-128 GCM mode has an average encryption time of 163 mu s and an average decryption time of 164 mu s. GIFT-COFB has an average encryption time of 164 mu s and an average decryption time of 165 mu s. Meanwhile, Romulus N1 has an average encryption time of 605 mu s and an average decryption time of 607 mu s. Our experiment shows that the fastest performance is produced by Tiny JAMBU, followed by AES-128 Mode GCM, GIFT-COFB and Romulus N1.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] An End-to-End Exponentially Secure Secrecy Scheme against an Unbounded Adversary
    Khiabani, Yahya S.
    Wei, Shuangqing
    [J]. 2013 47TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2013,
  • [32] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [33] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Secure End-to-End VoLTE based on Ethereum Blockchain
    Kfoury, Elie F.
    Khoury, David J.
    [J]. 2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 128 - 132
  • [35] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [36] End-to-End Secure Multi-Hop Communication with Untrusted Relays
    He, Xiang
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (01) : 1 - 11
  • [37] Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
    Kumar, Mukesh
    Sethi, Monika
    Rani, Shalli
    Sah, Dipak Kumar
    AlQahtani, Salman A.
    Al-Rakhami, Mabrook S.
    [J]. SENSORS, 2023, 23 (13)
  • [38] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    [J]. Cluster Computing, 2013, 16 : 861 - 871
  • [39] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [40] A Novel Visual Cryptography Scheme Based on Substitution Cipher
    Yadav, Gyan Singh
    Ojha, Aparajita
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 640 - 643