On the choice of the appropriate AES data encryption method for ZigBee nodes

被引:3
|
作者
Ottoy, G. [1 ,3 ]
Hamelinckx, T. [2 ,3 ]
Preneel, B. [1 ]
De Strycker, L. [2 ,3 ]
Goemaere, J. -P. [2 ,3 ]
机构
[1] Katholieke Univ Leuven, COSIC Res Grp, B-3001 Leuven Heverlee, Belgium
[2] Katholieke Univ Leuven, TELEMIC Res Grp, B-3001 Leuven Heverlee, Belgium
[3] Catholic Univ, Coll Ghent, DraMCo Res Grp, B-9000 Ghent, Belgium
关键词
software encryption; hardware encryption; AES-CBC-MAC; ZigBee; AREA;
D O I
10.1002/sec.267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the experiments that have been conducted to determine the optimal implementation method for AES ( Advanced Encryption Standard) data encryption in a ZigBee network in terms of energy consumption. Four possible scenarios have been considered. The first one is a freely available AES-cryptographic algorithm on the processor which controls the ZigBee nodes. The second also involves the processor but is based on a proprietary, highly optimized algorithm. The other methods are based on hardware implementations. Whereas the third option is based on a cryptographic block, embedded in the ZigBee node controller, the last solution utilizes an AES128-CBC-MAC hardware co-processor embedded on a Spartan 3A FPGA. The ZigBee modules in the network contain an 8-bit microcontroller which takes care of the ZigBee protocol stack-and the encryption calculations in all but the last case. All approaches are examined and compared. We show that the usage of a microcontroller with an on-board AES processor is the optimal design choice for a new hardware platform. An optimized software library gives the best results when extending an existing platform. This paper gives developers an idea of the amount of energy they can gain/lose by choosing one of the four solutions. Copyright (c) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [31] RETRACTED: Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things (Retracted Article)
    Luo, Zhonghua
    Shen, Keyong
    Hu, Rongqun
    Yang, Yuhan
    Deng, Rongchun
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [32] A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling
    Murthy, Kandala Sree Rama
    Manikandan, V. M.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (05) : 433 - 440
  • [33] Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment
    Su, Na
    Zhang, Yi
    Li, Mingyue
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2071 - 2075
  • [34] A New Approach for Enhancing AES-Based Data Encryption Using ECC
    Sherali, Fairouz
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2024, 19 (01): : 229 - 235
  • [35] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [36] Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm
    Mahalakshmi, B.
    Deshmukh, Ganesh
    Murthy, V. N. L. N.
    2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 363 - 366
  • [37] Hybrid encryption method for biological information database based on AES and hash algorithm
    Yan, Han-Chi
    Su, Chun-Lin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2024, 54 (10): : 2994 - 2999
  • [38] Low-cost and fast AES encryption method for industrial wireless network
    Luo, Xin-Qiang
    Qi, Yue
    Wan, Ya-Dong
    Wang, Qin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (01): : 55 - 60
  • [39] A Fast AES Encryption Method Based on Single LUT for Industrial Wireless Network
    Luo, Xinqiang
    Qi, Yue
    Wan, Yadong
    Wang, Qin
    Zhang, Hong
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 158 - 161
  • [40] A Differential Constellation Trace Figure based Device Identification Method for ZigBee Nodes
    Peng, Linning
    Hu, Aiqun
    Jiang, Yu
    Yan, Yan
    Zhu, Changming
    2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,