Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Applied Sciences  /  Vol: 12 Par: 17 (2022)  /  Artículo
ARTÍCULO
TITULO

A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

Agus Winarno and Riri Fitri Sari    

Resumen

Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely used in IoT implementation is MQTT. By default, MQTT does not provide data security features in the form of data encryption. Therefore, this research was carried out on the design of Secure End-to-End Encryption MQTT with Block Cipher-Based Lightweight Cryptography. The protocol is designed by utilizing the Galantucci secret sharing scheme and a lightweight cryptographic algorithm based on a block cipher. The algorithms used include AES-128 GCM mode, GIFT-COFB, Romulus N1, and Tiny JAMBU. We tested the Secure End-to-End for MQTT protocol on the ARM M4 and ESP8266 processors. Our testing results on NodeMCU board, Tiny JAMBU have an average encryption time of 313 μs" role="presentation">µsµs µ s and an average decryption time of 327 μs" role="presentation">µsµs µ s . AES-128 GCM mode has an average encryption time of 572 μs" role="presentation">µsµs µ s and an average decryption time of 584 μs" role="presentation">µsµs µ s . GIFT-COFB has an average encryption time of 1094 μs" role="presentation">µsµs µ s and an average decryption time of 1110 μs" role="presentation">µsµs µ s . Meanwhile, Romulus N1 has an average encryption time of 2157 μs" role="presentation">µsµs µ s and an average decryption time of 2180 μs" role="presentation">µsµs µ s . On STM32L4 discovery, Tiny JAMBU had average encryption of 82 μs" role="presentation">µsµs µ s and an average decryption time of 85 μs" role="presentation">µsµs µ s . AES-128 GCM mode has an average encryption time of 163 μs" role="presentation">µsµs µ s and an average decryption time of 164 μs" role="presentation">µsµs µ s . GIFT-COFB has an average encryption time of 164 μs" role="presentation">µsµs µ s and an average decryption time of 165 μs" role="presentation">µsµs µ s . Meanwhile, Romulus N1 has an average encryption time of 605 μs" role="presentation">µsµs µ s and an average decryption time of 607 μs" role="presentation">µsµs µ s . Our experiment shows that the fastest performance is produced by Tiny JAMBU, followed by AES-128 Mode GCM, GIFT-COFB and Romulus N1.

 Artículos similares

       
 
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information

 
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Yang Yang and Guanghua Song    
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing... ver más
Revista: Information

 
Fatemeh Stodt and Christoph Reich    
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i... ver más
Revista: Computers