Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications

被引:6
|
作者
Aslan, Bora [1 ]
Yavuzer Aslan, Fusun [2 ]
Sakalli, M. Tolga [3 ]
机构
[1] Kirklareli Univ, Dept Software Engn, Kirklareli, Turkey
[2] Kirklareli Univ, Dept Comp Programming, Kirklareli, Turkey
[3] Trakya Univ, Dept Comp Engn, Kirklareli, Turkey
关键词
BICLIQUE CRYPTANALYSIS;
D O I
10.1155/2020/8837671
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to the presence of wireless communication systems. An increasing number of M2M applications, such as smart meters, healthcare monitoring, transportation and packaging, or asset tracking, make a significant contribution to the growth of devices and connections. Within such a large and uncontrollable ecosystem, IoT poses several new problems. Security and privacy are among the most important of these problems. Lightweight cryptography can be used more effectively for small size, low energy, and small footprint such as RFID tags, sensors, and contactless smart cards. Therefore, it can be used to ensure security and privacy in the IoT applications. In this study, PRESENT, CLEFIA, PICCOLO, PRINCE, and LBLOCK lightweight cryptographic algorithms, which can be used to secure data in IoT applications, were analyzed in a test environment. As a result of the tests, the energy consumption of the algorithms, current measurement, active mode working time, and active mode energy consumption were identified and based on this, some inferences have been made.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
    Hasan, Mohammad Kamrul
    Shafiq, Muhammad
    Islam, Shayla
    Pandey, Bishwajeet
    El-Ebiary, Yousef A. Baker
    Nafi, Nazmus Shaker
    Rodriguez, R. Ciro
    Vargas, Doris Esenarro
    [J]. COMPLEXITY, 2021, 2021
  • [2] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [3] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    [J]. Wireless Networks, 2021, 27 : 1515 - 1555
  • [4] Lightweight and Secure Cryptographic Implementations for the Internet of Things
    Preneel, Bart
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV
  • [5] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Winderickx, Jori
    Braeken, An
    Singelee, Dave
    Mentens, Nele
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 137 - 149
  • [6] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Jori Winderickx
    An Braeken
    Dave Singelée
    Nele Mentens
    [J]. Journal of Cryptographic Engineering, 2022, 12 : 137 - 149
  • [7] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [8] Security analysis of the LED lightweight cipher in the internet of things
    Li, Wei
    Gu, Da-Wu
    Zhao, Chen
    Liu, Zhi-Qiang
    Liu, Ya
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (03): : 434 - 445
  • [9] Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things
    Li, Wei
    Zhang, Wenwen
    Gu, Dawu
    Tao, Zhi
    Zhou, Zhihong
    Liu, Ya
    Liu, Zhiqiang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (02): : 793 - 810
  • [10] A New Lightweight Hybrid Cryptographic Algorithm for The Internet of Things
    Shemaili, Mouza Bani
    Yeun, Chan Yeob
    Mubarak, Khalid
    Zemerly, Mohamed Jamal
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 87 - 92