An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices

被引:0
|
作者
Rana, Sohel [1 ]
Hossain, Saddam [2 ]
Shoun, Hasan Imam [2 ]
Abul Kashem, Mohammod [2 ]
机构
[1] Bangladesh Univ Business & Technol, Dept CSE, Mirpur 2, Dhaka, Bangladesh
[2] Dhaka Univ Engn & Technol, Dept CSE, Gazipur, Bangladesh
关键词
Lightweight cryptography; IoT; RFID tags; genetic algorithm; feistel architecture; SP network; FELICS; MATLAB;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.
引用
收藏
页码:267 / 275
页数:9
相关论文
共 50 条
  • [1] Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
    Ibrahim, Nahla
    Agbinya, Johnson
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [2] A lightweight secure cyber foraging infrastructure for resource-constrained devices
    Goyal, S
    Carter, J
    [J]. SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195
  • [3] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    [J]. SENSORS, 2024, 24 (12)
  • [4] A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices
    Gaglio, Salvatore
    Lo Re, Giuseppe
    Martorella, Gloria
    Peri, Daniele
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 355 - 359
  • [5] Lightweight Strong PUF for Resource-Constrained Devices
    Korona, Mateusz
    Giermakowski, Radoslaw
    Biernacki, Mateusz
    Rawski, Mariusz
    [J]. ELECTRONICS, 2024, 13 (02)
  • [6] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    [J]. SENSORS, 2020, 20 (13) : 1 - 18
  • [7] FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
    Zhang, Mo
    Marin, Eduard
    Oswald, David
    Singelee, Dave
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 289 - 309
  • [8] Lightweight secure group communications for resource constrained devices
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    Youssef, Habib
    Zemmari, Akka
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (04) : 187 - 200
  • [9] Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices
    Mhaibes, Hakeem Imad
    Abood, May Hattim
    Farhan, Alaa Kadhim
    [J]. International Journal of Interactive Mobile Technologies, 2022, 16 (20) : 98 - 113
  • [10] CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
    Koo, Bonwook
    Roh, Dongyoung
    Kim, Hyeonjin
    Jung, Younghoon
    Lee, Dong-Geon
    Kwon, Daesung
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 3 - 25