Abstract

High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.

Highlights

  • The Internet of Things (IoT) being a promising technology that enables people and objects in the physical world numerous devices and sensors will be communicating with each other

  • One node of IoT is an important sources of information and a sensitive information that need to be protected, while IoT is vulnerable to attacks [1], [2], such as message modification and/or alteration, traffic analysis, Denial of Service (DoS), Distributed DoS, eavesdropping, Sybil attacks, etc

  • Trivium is a stream cipher designed by Christophe De Canniere and Bart Preneel who participated in the eSTREAM competition and has been selected as part of a portfolio for hardware-oriented ciphers [4]

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) being a promising technology that enables people and objects in the physical world numerous devices and sensors will be communicating with each other. According to a study by HP states that 70% of the devices in IoT are vulnerable to attacks [3]. Some studies evaluated Trivium and other lightweight cryptographic algorithms performance as in [5], [6] and [7]. The hardware implementation of eSTREAM ciphers have been implemented on FPGA devices [8] or 8-bit AVR microcontrollers [9] and on NodeMCU [10]. The objective of this study is to implement Trivium on three versions of Raspberry Pi as an embedded device concept of IoT to provide security services and compare the results among them.

Trivium Architecture
Raspberry Pi
The Kruskal-Wallis H Test
IMPLEMENTATION
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call