On the choice of the appropriate AES data encryption method for ZigBee nodes

被引:3
|
作者
Ottoy, G. [1 ,3 ]
Hamelinckx, T. [2 ,3 ]
Preneel, B. [1 ]
De Strycker, L. [2 ,3 ]
Goemaere, J. -P. [2 ,3 ]
机构
[1] Katholieke Univ Leuven, COSIC Res Grp, B-3001 Leuven Heverlee, Belgium
[2] Katholieke Univ Leuven, TELEMIC Res Grp, B-3001 Leuven Heverlee, Belgium
[3] Catholic Univ, Coll Ghent, DraMCo Res Grp, B-9000 Ghent, Belgium
关键词
software encryption; hardware encryption; AES-CBC-MAC; ZigBee; AREA;
D O I
10.1002/sec.267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the experiments that have been conducted to determine the optimal implementation method for AES ( Advanced Encryption Standard) data encryption in a ZigBee network in terms of energy consumption. Four possible scenarios have been considered. The first one is a freely available AES-cryptographic algorithm on the processor which controls the ZigBee nodes. The second also involves the processor but is based on a proprietary, highly optimized algorithm. The other methods are based on hardware implementations. Whereas the third option is based on a cryptographic block, embedded in the ZigBee node controller, the last solution utilizes an AES128-CBC-MAC hardware co-processor embedded on a Spartan 3A FPGA. The ZigBee modules in the network contain an 8-bit microcontroller which takes care of the ZigBee protocol stack-and the encryption calculations in all but the last case. All approaches are examined and compared. We show that the usage of a microcontroller with an on-board AES processor is the optimal design choice for a new hardware platform. An optimized software library gives the best results when extending an existing platform. This paper gives developers an idea of the amount of energy they can gain/lose by choosing one of the four solutions. Copyright (c) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [21] An Evaluation of AES Encryption Modes on Data Transmission Performance in Distributed Systems
    Aydos, Bilal
    Yigit, Ibrahim Onuralp
    Candan, Kemal
    Bolata, Oguz Yusuf
    Altmay, Selcuk
    32ND IEEE SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU 2024, 2024,
  • [22] Effect of security increment to symmetric data encryption through AES methodology
    Islam, Md. Nazrul
    Mia, Md. Monir Hossain
    Chowdhury, Muhammad F. I.
    Matin, M. A.
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 291 - +
  • [23] Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information
    Shan, Jizhou
    Ma, Hong
    International Journal of Network Security, 2023, 25 (06) : 1064 - 1069
  • [24] Automata Designs for Data Encryption with AES using the Micron Automata Processor
    Kongmunvattana, Angkul
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 1 - 5
  • [25] Design, and evaluation of data-dependent hardware for AES encryption algorithm
    Atono, Ryoichiro
    Ichikawa, Shuichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (07): : 2301 - 2305
  • [26] On The Voice and Image Data Encryption using Advanced Encryption Standard (AES) in Counter Mode for Multimedia Broadcasting
    Kim, Junghwan
    Basavarasu, Srinvasa R.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2015,
  • [27] A Smart Trojan Circuit and Smart Attack Method in AES Encryption Circuits
    Yoshimura, Masayoshi
    Ogita, Amy
    Hosokawa, Toshinori
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 278 - 283
  • [28] Image encryption method based on improved ECC and modified AES algorithm
    Amal Hafsa
    Anissa Sghaier
    Jihene Malek
    Mohsen Machhout
    Multimedia Tools and Applications, 2021, 80 : 19769 - 19801
  • [29] Image encryption method based on improved ECC and modified AES algorithm
    Hafsa, Amal
    Sghaier, Anissa
    Malek, Jihene
    Machhout, Mohsen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) : 19769 - 19801
  • [30] Are objective data an appropriate replacement for subjective data in site choice analysis?
    Deely, John
    Hynes, Stephen
    Curtis, John
    JOURNAL OF ENVIRONMENTAL ECONOMICS AND POLICY, 2019, 8 (02) : 159 - 178